Damn Vulnerable eXtensive Training Environment
☆108Mar 15, 2022Updated 4 years ago
Alternatives and similar repositories for dvxte
Users that are interested in dvxte are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hardening Tool for *nixes☆50Apr 22, 2017Updated 8 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- ☆23Apr 6, 2019Updated 7 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 9 years ago
- F-Scrack is a single file bruteforcer supports multi-protocol☆310Sep 5, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- ☆13May 30, 2017Updated 8 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆223Oct 16, 2023Updated 2 years ago
- 仓库已经废弃,新仓库地址☆47May 26, 2017Updated 8 years ago
- DOOM是在thorn上实现的分布式任务分发的ip端口漏洞扫描器☆136Dec 1, 2015Updated 10 years ago
- Vulnerable OTP/2FA Application written in PHP using Google Authenticator☆87Nov 13, 2019Updated 6 years ago
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆13Jun 13, 2016Updated 9 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Zmap on Web☆94Oct 13, 2016Updated 9 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- 兄弟域名查询☆224Jan 2, 2016Updated 10 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 9 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- moduled sniffer TCP/UDP Proxy for man-in-the-middle attack☆16Aug 8, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆628Feb 5, 2019Updated 7 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- C++-based shellcode builder☆115Nov 19, 2020Updated 5 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆310Oct 22, 2016Updated 9 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A curated list of "damn vulnerable apps" and exploitable VMs / wargames. See contributing.md for information.☆34Apr 27, 2019Updated 6 years ago
- This repo contains the lazyFuzzer and the Report on the output from the same☆17Oct 26, 2019Updated 6 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Damn Small Vulnerable Web☆863Dec 21, 2025Updated 3 months ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆141Aug 31, 2021Updated 4 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago