juice-shop / juicy-malware
☆17Updated 4 years ago
Alternatives and similar repositories for juicy-malware
Users that are interested in juicy-malware are comparing it to the libraries listed below
Sorting:
- ☆78Updated 2 years ago
- This projects provides a logger and a connected harlem shake js.☆19Updated last year
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆45Updated last month
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆43Updated last month
- Crappy Python code to render a QR code as "plaintext" with Unicode☆38Updated last year
- A Content Discovery and Development Platform. Empowering Cybersecurity, AI, Marketing, and Finance professionals and researchers to disco…☆47Updated this week
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 3 years ago
- 📙 User documentation for Caido☆26Updated this week
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆54Updated last year
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆20Updated 9 months ago
- The Arcanum Prompt Injection Taxonomy☆81Updated this week
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆43Updated last month
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆32Updated 3 months ago
- capNcook - a dark web exploration tool☆100Updated 7 months ago
- Execute Trickest workflows right from your terminal☆91Updated last week
- a collection of best pentest resources☆26Updated 6 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 9 months ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆46Updated 11 months ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆48Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆72Updated 10 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- REplay is a reverse engineering playground that has 3 separate levels and acts as a fancy little playground mimicking real world reverse …☆15Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆43Updated 8 months ago
- Damn Vulnerable C# Application (API)☆74Updated 10 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆100Updated 7 months ago
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆50Updated 5 months ago
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆44Updated 2 years ago
- DPULSE - Tool for complex approach to domain OSINT☆119Updated this week