Vulnerable Python Application To Learn Secure Development
☆127May 31, 2024Updated last year
Alternatives and similar repositories for vulpy
Users that are interested in vulpy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Damn Vulnerable Python Web App☆185May 21, 2024Updated last year
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- SecTalks socially authored website☆20Jul 23, 2025Updated 8 months ago
- Securade.ai Sentinel - A monitoring and surveillance application that enables visual Q&A and video captioning for existing CCTV cameras.☆27Apr 6, 2025Updated 11 months ago
- flask-webgoat is a deliberately-vulnerable application written with the Flask web framework.☆19Sep 5, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Web application recon for bug bounty☆21Apr 19, 2020Updated 5 years ago
- my templates for the nuclei engine to find security vulnerabilities.☆10Aug 19, 2024Updated last year
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- Vulnerable Java based Web Application☆34Jun 24, 2019Updated 6 years ago
- GitHub Advanced Security C# Demo Application☆17Aug 8, 2024Updated last year
- A deliberately vulnerable web application for learning web application security.☆149Apr 28, 2025Updated 11 months ago
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆33Nov 24, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆21Jul 25, 2025Updated 8 months ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15Updated this week
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆14Mar 29, 2022Updated 4 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- 记录下学习Android AOSP源码的过程。☆20Feb 6, 2025Updated last year
- A very vulnerable web site written in NodeJS with the purpose of have a project with identified vulnerabilities to test the quality of se…☆484Aug 20, 2024Updated last year
- React Suspended is an educational frontend application riddled with security vulnerabilities☆10Jan 29, 2024Updated 2 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Passive subdomain enumeration tool with http-probe.☆32Apr 30, 2021Updated 4 years ago
- intentionally vuln web Application Security in django☆318Mar 19, 2026Updated last week
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- OWASP VulnerableApp Project: For Security Enthusiasts by Security Enthusiasts.☆377Updated this week
- A Django vulnerable Web application for testing the w3af framework☆32Jul 6, 2022Updated 3 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 6 years ago
- USBNinja steals all Wifi SSID's and passwords that a computer has been connected to and sends them to a mail by choice. Works on Windows …☆21Nov 26, 2019Updated 6 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- ☆20Sep 2, 2021Updated 4 years ago