juice-shop / multi-juicerView external linksLinks
Host and manage multiple Juice Shop instances for security trainings and Capture The Flags
☆308Feb 8, 2026Updated last week
Alternatives and similar repositories for multi-juicer
Users that are interested in multi-juicer are comparing it to the libraries listed below
Sorting:
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆461Jan 21, 2026Updated 3 weeks ago
- Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"☆232Feb 8, 2026Updated last week
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 4 years ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Jul 7, 2020Updated 5 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆754Oct 14, 2023Updated 2 years ago
- secureCodeBox (SCB) - continuous secure delivery out of the box☆955Feb 6, 2026Updated last week
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆12,501Updated this week
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆23Oct 14, 2020Updated 5 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆647Nov 21, 2019Updated 6 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆883Dec 15, 2025Updated 2 months ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆602Nov 28, 2024Updated last year
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,731Updated this week
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- Traze is a simple tron-like multi client online game serving as a playground for exploring new technologies.☆13Dec 31, 2019Updated 6 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆545Sep 11, 2025Updated 5 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆998Updated this week
- GitHub Actions Pipeline Enumeration and Attack Tool☆726Sep 17, 2025Updated 4 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆55Updated this week
- Data exfiltration utility for testing detection capabilities☆57Jan 13, 2022Updated 4 years ago
- University lecture on "IT Security" as Open Educational Resources material☆376Aug 18, 2023Updated 2 years ago
- Pin designs for security related items☆37May 10, 2024Updated last year
- Peirates - Kubernetes Penetration Testing tool☆1,420Jan 20, 2026Updated 3 weeks ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292May 2, 2024Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Mar 27, 2022Updated 3 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- ☆55Apr 25, 2023Updated 2 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 7 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,548Nov 24, 2025Updated 2 months ago
- gather gather gather☆584Mar 15, 2025Updated 11 months ago
- A Game of Hackers (CTF Scoreboard & Game Manager)☆1,084Jul 22, 2025Updated 6 months ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year