Intentionally vulnerable Linux application for buffer overflow and RCE development practice
☆29Aug 26, 2021Updated 4 years ago
Alternatives and similar repositories for VulnServer-Linux
Users that are interested in VulnServer-Linux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and clear TryHackMe desktop application for Windows /Linux / MacOS☆12Feb 6, 2021Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- ☆30Jul 8, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆26Apr 30, 2020Updated 5 years ago
- Vulnerable server used for learning software exploitation☆1,109Oct 9, 2020Updated 5 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- ☆14Mar 19, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Mar 22, 2022Updated 4 years ago
- DNS and Target HTTP History Local Storage and Search☆63Feb 14, 2021Updated 5 years ago
- Convert infrastructure scans into various output formats such as Markdown tables, YAML, HTML, CSV, and more. Can also be used to generate…☆23Mar 16, 2026Updated 3 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- 💠 Documented and undocumented WinAPI search.☆21Jul 22, 2025Updated 8 months ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated last month
- Javascript Host inside PowerShell allowing the execution of Javascript, TypeScript from PowerShell. In the future also CoffeeScript, FunS…☆26Apr 17, 2014Updated 11 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13Sep 23, 2019Updated 6 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 6 years ago
- ☆12Oct 10, 2024Updated last year
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Apr 1, 2026Updated last week
- Bad Apple in Amiga Anim format, complete with a guide on how to make your own Sound Anims☆10Jul 2, 2020Updated 5 years ago
- Simple php reverse shell implemented using binary .☆442Nov 17, 2023Updated 2 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- Simple script to generate commands to achieve reverse shells.☆121Dec 14, 2020Updated 5 years ago
- ☆15May 17, 2018Updated 7 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Sep 14, 2023Updated 2 years ago