iriusrisk / RopeyTasksView external linksLinks
Deliberately vulnerable web application
☆22Jun 18, 2017Updated 8 years ago
Alternatives and similar repositories for RopeyTasks
Users that are interested in RopeyTasks are comparing it to the libraries listed below
Sorting:
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Project examples☆12Feb 15, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- (Deprecated) HQLmap, Automatic tool to exploit HQL injections☆231Feb 7, 2020Updated 6 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 3 years ago
- The Zulu fuzzer☆124Sep 25, 2017Updated 8 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago
- Tutorial for Node.js security☆21Sep 4, 2020Updated 5 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 10 months ago
- Tools for encrypting and decrypting things using Cisco's type 7 encryption.☆15Jan 11, 2013Updated 13 years ago
- A brute-forcing delta robot☆28Sep 17, 2014Updated 11 years ago
- REST API test utility☆22Oct 31, 2019Updated 6 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- Automatic firewall rule orchestator.☆82Sep 28, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Connectors for the Zeek NetControl framework☆19Feb 4, 2025Updated last year
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- Simple script for PGP encrypted newsletter☆26Feb 13, 2016Updated 10 years ago
- A Wordpress Honeypot☆185Feb 7, 2023Updated 3 years ago
- Windows PowerShell domain scanning tool☆54Apr 23, 2016Updated 9 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- File/Web Text Scraper and Wordlist Generator☆40Oct 1, 2020Updated 5 years ago
- Client/server scripts designed to test outbound (egress) firewall rules.☆37Sep 9, 2013Updated 12 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Apr 20, 2022Updated 3 years ago
- Cartero - Social Engineering Framework☆175Jun 23, 2020Updated 5 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- Bluetooth Low Energy Device spoofing library☆29Nov 20, 2017Updated 8 years ago
- ☆40Feb 23, 2016Updated 9 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Apr 22, 2018Updated 7 years ago