an extremely buggy web app !
☆46Dec 5, 2016Updated 9 years ago
Alternatives and similar repositories for bwapp
Users that are interested in bwapp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- A script to enumerate valid usernames based on the requests response times.☆23May 3, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- ☆16Jan 10, 2017Updated 9 years ago
- Solutions for the HackThisSite Missions☆16Nov 29, 2017Updated 8 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 11 years ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆25Dec 4, 2020Updated 5 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 5 years ago
- SHELL SCANNER☆21Apr 11, 2019Updated 7 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- ☆11Jan 8, 2024Updated 2 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 6 years ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 3 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Short add-on to termux to enable phone-calls using contact book and auto-completion☆12Sep 24, 2020Updated 5 years ago
- Generate Random Reset Instagram URLs and check if they still valid for a complete account takeover☆12Apr 26, 2022Updated 3 years ago
- rwwwshell: Getting a reverse shell with Mr. Robot ;)☆36Jul 16, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆14Jan 31, 2026Updated 2 months ago
- Command line interface for our public API☆20Jan 9, 2023Updated 3 years ago
- Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP To…☆12Jan 30, 2023Updated 3 years ago
- ERPNext / Frappe Framework MariaDB configuration file☆16Jun 22, 2021Updated 4 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆36Aug 4, 2021Updated 4 years ago
- Sql injection vulnerability scanner☆12Aug 27, 2020Updated 5 years ago
- ☆13Sep 13, 2019Updated 6 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆13May 19, 2022Updated 3 years ago
- Study about HQL injection exploitation.☆52May 15, 2016Updated 9 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- ☆23Jan 22, 2017Updated 9 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- The NodeJs cookie stealer is a tool that can be used in penetration testing and XSS attacks to steal browser cookies from victims.☆13Apr 5, 2023Updated 3 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Jul 7, 2017Updated 8 years ago