aligorithm / Zero-HealthView external linksLinks
Zero trust. Zero security. Total exposure. A deliberately vulnerable health tech platform with AI Chatbot for learning about application security and ethical hacking. It contains vulnerabilities from OWASP top 10 Web, API and AI/LLM Security Vulnerabilities. Highly vulnerable, never use in production.
☆40Jun 15, 2025Updated 8 months ago
Alternatives and similar repositories for Zero-Health
Users that are interested in Zero-Health are comparing it to the libraries listed below
Sorting:
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆78Nov 25, 2025Updated 2 months ago
- Provides a convention for modelling user interactions as use case classes.☆23Jun 30, 2017Updated 8 years ago
- Checker de cuentas Blim para android [TERMUX]☆11Jan 21, 2019Updated 7 years ago
- ☆10Dec 5, 2025Updated 2 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ☆13Apr 12, 2019Updated 6 years ago
- Magic: The Gathering card web scraper☆10Dec 18, 2020Updated 5 years ago
- ForgeRock Identity Cloud Debug Tools☆11Jan 27, 2023Updated 3 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Golang Web Toolkit☆16Nov 5, 2011Updated 14 years ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆14Jun 4, 2024Updated last year
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆11May 27, 2023Updated 2 years ago
- Dyne.org's W3C-DID implementation☆12May 16, 2024Updated last year
- Varios mini-projectos de ML☆10May 22, 2018Updated 7 years ago
- BambooHR Slack bot publishes company holidays, work anniversaries, first days, birthdays, and who is out each weekday.☆10Mar 4, 2023Updated 2 years ago
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆13Jun 3, 2025Updated 8 months ago
- ☆11Jun 14, 2015Updated 10 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- https://ansi.tools☆33Jan 12, 2026Updated last month
- A Ruby URL parser and constructor that works as you expect☆10Sep 2, 2025Updated 5 months ago
- A collection of guides related to GraphQL Schema Design☆12Jun 7, 2025Updated 8 months ago
- Publicly accessible version of the FiGHT website.☆16Nov 14, 2025Updated 3 months ago
- Creating a custom api☆11Mar 4, 2019Updated 6 years ago
- Docker workshop☆12Aug 24, 2020Updated 5 years ago
- A container render-prop component to initialize, handle and derive state in React.☆11Mar 30, 2018Updated 7 years ago
- The OWASP SAMM Website☆11Feb 9, 2026Updated last week
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆11Oct 8, 2025Updated 4 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- A Python Flask Web App Development Skeleton w/ mongoDB☆12Sep 30, 2020Updated 5 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- Minimal, PURE MiniTest::Spec for Rails tests☆10Jul 29, 2017Updated 8 years ago
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 9 months ago
- Peronio Core☆12Apr 18, 2023Updated 2 years ago
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆12Jun 6, 2024Updated last year
- A React component that allows for editing and autosave behaviour, combining an Apollo Query and Mutation.☆10Nov 5, 2018Updated 7 years ago
- ☆15Nov 28, 2018Updated 7 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- A gem that replaces Rails' default Yarn integration with pnpm.☆10Apr 27, 2023Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago