The aim of the project is to develop intentionally vulnerable source code in various languages.
☆15Mar 3, 2026Updated 2 weeks ago
Alternatives and similar repositories for Damn-Vulnerable-Source-Code
Users that are interested in Damn-Vulnerable-Source-Code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 6 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- Serverless Event Driven framework for Copying of Snapshots to a Disaster Recovery Account☆11Jun 19, 2024Updated last year
- AI-based Web Application Penetration Testing Tool☆25Jan 19, 2024Updated 2 years ago
- Vulnserver exploits☆15May 1, 2020Updated 5 years ago
- My notes on PentesterLab's Bootcamp series 🕵️☆46Oct 17, 2023Updated 2 years ago
- AWS Personalize integration for Magento 2 to generate product recommendation and related products☆14Jan 27, 2020Updated 6 years ago
- ☆16Jan 10, 2017Updated 9 years ago
- PoC☆12Apr 7, 2025Updated 11 months ago
- Damn Vulnerable Java (EE) Application☆147Jan 23, 2024Updated 2 years ago
- Cloud Haskell - Asynchronous Execution☆18Sep 3, 2024Updated last year
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- A XPath injection demonstration application☆21Nov 14, 2020Updated 5 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Damn Vulnerable C# Application (API)☆80Jul 15, 2024Updated last year
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Examples showing use of NGC containers and models withing Amazon SageMaker☆17Oct 4, 2022Updated 3 years ago
- CRLF Detection based on @BlackFan 's work See link below☆16Mar 14, 2024Updated 2 years ago
- A curated list of awesome command-line frameworks, toolkits, guides and gizmos. Inspired by awesome-php. With repository stars⭐ and forks…☆26Mar 16, 2026Updated last week
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- programmatic control of the mouse☆16Jun 28, 2023Updated 2 years ago
- Damn Vulnerable Cloud Application☆209Sep 12, 2018Updated 7 years ago
- ☆13Apr 14, 2024Updated last year
- RatChatPT☆16Jun 9, 2023Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Lambda functions and CloudFormation templates required for building serverless applications on top of Amazon DocumentDB☆20May 20, 2024Updated last year
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- Official Website Of The Sigma Project☆23Feb 16, 2026Updated last month