c0brabaghdad1 / DVPAView external linksLinks
Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges
☆33May 18, 2022Updated 3 years ago
Alternatives and similar repositories for DVPA
Users that are interested in DVPA are comparing it to the libraries listed below
Sorting:
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- ☆12Sep 22, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- simple code directory brute☆17Feb 26, 2021Updated 4 years ago
- ☆21May 1, 2021Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- ☆36Jun 23, 2022Updated 3 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 2 years ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Apr 19, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Magic tricks using grep, sed and awk☆27Jul 28, 2022Updated 3 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Apr 17, 2022Updated 3 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- AWS Security Tool☆30Jan 1, 2024Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- CLI Version of SKF Labs☆14Oct 3, 2023Updated 2 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Jul 18, 2024Updated last year
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- ☆10Feb 22, 2023Updated 2 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆31Jan 18, 2022Updated 4 years ago