Virtual machines that are set up with a variety of known vulnerabilities.
☆17Mar 1, 2022Updated 4 years ago
Alternatives and similar repositories for vulnerable-instances
Users that are interested in vulnerable-instances are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- Malicious URLs and IP Addresses compiled by USOM (Computer Emergency Response Team of Turkey), updated once a day.☆22Apr 29, 2026Updated last week
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CaptureIT can generate GIFs of both the actively selected window or your entire desktop☆32Aug 11, 2018Updated 7 years ago
- a collection of wordlist for different projects☆13Oct 12, 2024Updated last year
- Practical biomagnet stimulators for science, development and entertainment! Open source!☆13Feb 18, 2025Updated last year
- ☆18Mar 24, 2026Updated last month
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆20Apr 22, 2026Updated 2 weeks ago
- A Dockerized Ghidra Server☆15Jan 9, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- go-bssid-geolocator☆14Mar 19, 2025Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Apr 28, 2026Updated last week
- ☆20May 28, 2024Updated last year
- A motorcycle alarm based on Toit, ESP32, and the LIS3DH MEMS accelerometer☆14Mar 14, 2022Updated 4 years ago
- Logs key Windows process performance metrics. #nsacyber☆69Dec 8, 2022Updated 3 years ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆13Nov 2, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- ☆16May 15, 2025Updated 11 months ago
- A sort of a toolkit to decrypt Dropbox Windows DBX files☆32Apr 30, 2017Updated 9 years ago
- automated sticky keys backdoor☆10Feb 12, 2016Updated 10 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CA Issuers Monitor (Authority Info Access)☆14Mar 8, 2023Updated 3 years ago
- A Security Results Viewer for the web with storage, teams and history☆35Jan 19, 2023Updated 3 years ago
- Fork of ReactOS (Cmd.exe), IRTriage Command Line Interpreter☆20Jun 4, 2018Updated 7 years ago
- Automated pshtt, trustymail, and sslyze scanning☆30Apr 24, 2026Updated last week
- Search a filesystem for indicators of compromise (IoC).☆86Updated this week
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- ☆16Mar 3, 2026Updated 2 months ago