Damn Vulnerable SCA Application
☆43Mar 30, 2026Updated 2 weeks ago
Alternatives and similar repositories for Damn-vulnerable-sca
Users that are interested in Damn-vulnerable-sca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Updated this week
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆33Mar 4, 2025Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 months ago
- ☆14Jul 9, 2024Updated last year
- ☆40Aug 2, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Mar 1, 2024Updated 2 years ago
- Fast Rust library for PDF inspection, classification, and text extraction. Intelligently detects scanned vs text-based PDFs to enable sma…☆62Updated this week
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Mar 30, 2026Updated 2 weeks ago
- ☆13Dec 3, 2025Updated 4 months ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Mar 21, 2026Updated 3 weeks ago
- ETHICAL-HACKING☆13Dec 20, 2023Updated 2 years ago
- Just a vault template to help someone on the certificate.☆14Sep 3, 2025Updated 7 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆18Oct 8, 2024Updated last year
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Mar 9, 2017Updated 9 years ago
- Bluetooth Landscape Exploration & Enumeration Platform☆53Mar 4, 2026Updated last month
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Baeldung Ops Tutorials☆13Aug 25, 2025Updated 7 months ago
- ☆18Apr 15, 2024Updated 2 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆54Sep 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆89Feb 11, 2022Updated 4 years ago
- ☆13Aug 20, 2025Updated 7 months ago
- Allow exporting the information downloaded with sqlmap to a relational Database like Postgres and sqlite☆44Sep 12, 2024Updated last year
- ▶️ Server on Demand Appliance (Google Compute Engine) - Cloud Build with Terraform and Ansible Showcase☆13Oct 12, 2025Updated 6 months ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Welcome to the Camunda Community Hub! This is the starting point for those interested in joining and contributing to the Camunda Communi…☆22Dec 9, 2025Updated 4 months ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆65Nov 12, 2025Updated 5 months ago
- ☆26Nov 7, 2023Updated 2 years ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- REplay is a reverse engineering playground that has 3 separate levels and acts as a fancy little playground mimicking real world reverse …☆16Apr 13, 2024Updated 2 years ago
- Jumpstart multiple WebSocket servers quickly☆33Nov 23, 2021Updated 4 years ago
- Process URLs and remove duplicate query parameters.☆27Mar 19, 2024Updated 2 years ago
- Glossary of security terms☆12Feb 26, 2026Updated last month
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆30Mar 23, 2026Updated 3 weeks ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year