Deliberately vulnerable web application
☆22Jun 18, 2017Updated 8 years ago
Alternatives and similar repositories for RopeyTasks
Users that are interested in RopeyTasks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- (Deprecated) HQLmap, Automatic tool to exploit HQL injections☆231Feb 7, 2020Updated 6 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆38Aug 22, 2016Updated 9 years ago
- A tool for detecting regular expression denial-of-service vulnerabilities in Android apps.☆36Jun 24, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- ☆10Sep 12, 2019Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- The Zulu fuzzer☆124Sep 25, 2017Updated 8 years ago
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago
- REST API test utility☆22Oct 31, 2019Updated 6 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Mar 30, 2017Updated 8 years ago
- Trigger automated Acunetix scans as part of your web application's build process☆32Aug 9, 2024Updated last year
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Solutions to CTF problems.☆11May 29, 2016Updated 9 years ago
- ☆10Dec 19, 2017Updated 8 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆90Sep 7, 2017Updated 8 years ago
- a passive scanner based on Mitmproxy and Arachni☆108Aug 17, 2017Updated 8 years ago
- File/Web Text Scraper and Wordlist Generator☆40Oct 1, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- A vulnerable Play application for attackers.☆18Mar 3, 2026Updated 3 weeks ago
- Windows PowerShell domain scanning tool☆54Apr 23, 2016Updated 9 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆84Aug 6, 2014Updated 11 years ago
- A Wordpress Honeypot☆185Feb 7, 2023Updated 3 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- ☆11May 16, 2024Updated last year
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Connectors for the Zeek NetControl framework☆19Feb 4, 2025Updated last year
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 10 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Apr 22, 2018Updated 7 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Apr 20, 2022Updated 3 years ago