juice-shop / juicy-malwareLinks
☆19Updated 5 years ago
Alternatives and similar repositories for juicy-malware
Users that are interested in juicy-malware are comparing it to the libraries listed below
Sorting:
- Crappy Python code to render a QR code as "plaintext" with Unicode☆39Updated last year
- OWASP juice shop solutions☆40Updated 3 years ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆82Updated last year
- ☆19Updated last month
- Source code of santagift.shop website.☆82Updated 3 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆68Updated last year
- A new social network for taking photos in your home town.☆72Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆279Updated last year
- Complete solution for intentionally vulnerable webshop: "Juice Shop"☆95Updated 9 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆321Updated last week
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆87Updated 7 months ago
- capNcook - a dark web exploration tool☆85Updated last year
- Single animated HTML file that teaches the workings of the TCP Handshake.☆26Updated 9 months ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆274Updated last week
- A living document for penetration testing and offensive security.☆310Updated last year
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆52Updated last year
- Dirty python script to munge dictionary words into password.☆72Updated last week
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆412Updated 2 months ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆444Updated 7 months ago
- Free and publicly available training labs and exercises, for quick copy-and-paste demonstrations, learning and education.☆126Updated 2 years ago
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆542Updated 3 weeks ago
- A list of the best cybersecurity research related blogs.☆33Updated 7 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆493Updated last year
- LLM Powered Pentesting for your software☆172Updated 6 months ago
- Autofill Phishing☆85Updated 4 months ago
- Vulnerable API☆418Updated 2 years ago
- ☆202Updated 11 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆253Updated 5 months ago
- Pentest Report Generator☆440Updated 2 months ago
- ☆28Updated last year