Code for installing various security minded tools onto Vagrant powered virtual machines
☆172Jul 21, 2014Updated 11 years ago
Alternatives and similar repositories for pentesting-playground
Users that are interested in pentesting-playground are comparing it to the libraries listed below
Sorting:
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- scripts for pentesting☆88Oct 5, 2018Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- miscellaneous handy pentesting tools☆63Jan 1, 2021Updated 5 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- a collection of useful scripts that for penetration testers☆35Jan 22, 2022Updated 4 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- Burp Suite AMF Extension☆48Sep 24, 2018Updated 7 years ago
- A collection of scripts and tools I have authored to aid in Pentesting, provided under GNUv3, NOTE: I am not liable if you use them for i…☆34Oct 23, 2018Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Feb 11, 2012Updated 14 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- ☆18Dec 16, 2023Updated 2 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated last month
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- Scan for signal peaks with RTL-SDR☆35Jun 15, 2013Updated 12 years ago
- (◍•﹏•) - Hi, I'm Eve☆21May 20, 2018Updated 7 years ago
- Educational Exploitable Web Application☆24Feb 9, 2016Updated 10 years ago