☆18Oct 11, 2018Updated 7 years ago
Alternatives and similar repositories for ph2016
Users that are interested in ph2016 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jun 14, 2016Updated 9 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Web Application Security☆131Jan 6, 2026Updated 2 months ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- ☆13Jan 29, 2015Updated 11 years ago
- Strace with enhancements to understand some Android 'binder' IPC calls☆13Aug 7, 2012Updated 13 years ago
- ☆44Sep 28, 2016Updated 9 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆19May 29, 2017Updated 8 years ago
- The disclosure website for httpoxy☆10Jan 20, 2023Updated 3 years ago
- ☆12Jun 7, 2018Updated 7 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- linux kernel system call hooking☆18Dec 13, 2014Updated 11 years ago
- This is Chrome extension for detecting CSRF vulnerabilities.☆10Jun 23, 2017Updated 8 years ago
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 12 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Android load custom dex file☆12Aug 16, 2014Updated 11 years ago
- ☆12Jul 1, 2018Updated 7 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- A Capistrano (v3) task for automated Ubuntu server configuration (Installing Nginx, Postgre, Redis, RVM and many others)☆26Aug 24, 2016Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 9 years ago
- android kernel disassembler based on MAME emulator code☆39Nov 26, 2013Updated 12 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- ☆13Nov 17, 2022Updated 3 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Code repository for Mastering Modern Web Penetration Testing, published by Packt☆72Jan 30, 2023Updated 3 years ago
- ☆40Apr 21, 2015Updated 10 years ago
- Terraformed elasticsearch cluster in AWS☆24Nov 24, 2016Updated 9 years ago
- Audio visualization system based of Koch Fractals with Unity☆12Sep 28, 2018Updated 7 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 4 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- ☆12May 9, 2017Updated 8 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- Spring Actionscript☆13Apr 4, 2022Updated 3 years ago
- Get symbol address and name from tables for kallsyms☆33Apr 4, 2016Updated 9 years ago
- [Android Library] Log information in Android☆15Dec 7, 2023Updated 2 years ago