Faraday Workspaces for Bug Bounties
☆21Jan 19, 2016Updated 10 years ago
Alternatives and similar repositories for faraday_bugbounty
Users that are interested in faraday_bugbounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 13 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- HMAC timing attack's w/ statistical analysis☆23Sep 19, 2013Updated 12 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆48Mar 26, 2026Updated last month
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 9 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- A tool (and library) for TACKs☆31Jun 15, 2017Updated 8 years ago
- A set of XSS vulnerable PHP scripts for testing☆39Feb 10, 2013Updated 13 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- Cross-platform radio signal visualizer for HackRF & other SDR platforms.☆17Oct 1, 2020Updated 5 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Binary Ninja Plugin for devi - see https://github.com/murx-/devi/ for devi details☆20Jan 17, 2024Updated 2 years ago
- Educational Exploitable Web Application☆24Feb 9, 2016Updated 10 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- c programming☆10Oct 31, 2020Updated 5 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Clickjacking Proof-of-Concept Exploit☆26Oct 1, 2020Updated 5 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 11 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Android app to bypass SSL certificate validation (Certificate Pinning).☆16Feb 7, 2016Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago