Vulnerable web site. Used to test sentinel features.
☆11Nov 18, 2016Updated 9 years ago
Alternatives and similar repositories for SentinelTestbed
Users that are interested in SentinelTestbed are comparing it to the libraries listed below
Sorting:
- Lab set-up for learning SQL Injection Techniques☆101Dec 6, 2020Updated 5 years ago
- A collection of web pages, vulnerable to command injection flaws☆180Mar 5, 2023Updated 2 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Jun 25, 2015Updated 10 years ago
- *This project is no longer maintained* OWASP GoatDroid is a fully functional and self-contained training environment for educating develo…☆253Jul 29, 2014Updated 11 years ago
- WackoPicko is a vulnerable web application used to test web application vulnerability scanners.☆346May 25, 2024Updated last year
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆446Aug 7, 2020Updated 5 years ago
- A simple capture the flag framework.☆125May 28, 2017Updated 8 years ago
- OWASP WebGoat.NET☆246Dec 16, 2023Updated 2 years ago
- UUID issues for Burp Suite☆54Jun 2, 2022Updated 3 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Apr 17, 2016Updated 9 years ago
- xResolver - Xbox Resolver and PSN Resolver with Gamertag IP Puller☆17Apr 27, 2021Updated 4 years ago
- Framework for static and dynamic analysis in Android APKs☆32Jul 25, 2017Updated 8 years ago
- The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.☆281Aug 13, 2024Updated last year
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- A modern vulnerable web app☆1,019Mar 11, 2021Updated 4 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Smart contract for Pandora - A next-gen community-owned DEX☆11Aug 2, 2024Updated last year
- Packet Construction Set☆10Nov 20, 2017Updated 8 years ago
- VirtuaPlant is a Industrial Control Systems simulator which adds a “similar to real-world control logic” to the basic “read/write tags” f…☆233Feb 11, 2022Updated 4 years ago
- WebEngineering Project☆13Nov 16, 2011Updated 14 years ago
- Website for the Mininet Project.☆12Apr 1, 2022Updated 3 years ago
- A Layer-7 HTTP DOS tool☆10Jul 12, 2018Updated 7 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Apr 23, 2020Updated 5 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Metasploit Framework with Viproy installed.☆36Mar 15, 2017Updated 8 years ago
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆457Dec 6, 2021Updated 4 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Feb 3, 2016Updated 10 years ago
- learn the basics of gulp☆10Aug 17, 2015Updated 10 years ago
- Scripts to get the most out of Tenable.io☆12Feb 10, 2021Updated 5 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Get your latitude/longitude via wifi access points☆15Sep 25, 2012Updated 13 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Examples for using the dedupe library☆10Feb 22, 2016Updated 10 years ago
- Extract files using QR Codes☆10Feb 10, 2018Updated 8 years ago