Host and manage multiple Juice Shop instances for security trainings and Capture The Flags
☆308Mar 6, 2026Updated this week
Alternatives and similar repositories for multi-juicer
Users that are interested in multi-juicer are comparing it to the libraries listed below
Sorting:
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆462Jan 21, 2026Updated last month
- Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"☆232Updated this week
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Jul 7, 2020Updated 5 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆755Oct 14, 2023Updated 2 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆12,634Updated this week
- secureCodeBox (SCB) - continuous secure delivery out of the box☆961Updated this week
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆23Oct 14, 2020Updated 5 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆645Nov 21, 2019Updated 6 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last week
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆605Nov 28, 2024Updated last year
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,737Feb 16, 2026Updated 3 weeks ago
- Traze is a simple tron-like multi client online game serving as a playground for exploring new technologies.☆13Dec 31, 2019Updated 6 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆550Sep 11, 2025Updated 5 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,011Updated this week
- GitHub Actions Pipeline Enumeration and Attack Tool☆732Updated this week
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆55Updated this week
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- University lecture on "IT Security" as Open Educational Resources material☆376Aug 18, 2023Updated 2 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 3 weeks ago
- Peirates - Kubernetes Penetration Testing tool☆1,425Jan 20, 2026Updated last month
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292May 2, 2024Updated last year
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- The Shadow Attack Framework☆1,115Sep 4, 2022Updated 3 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- ☆55Apr 25, 2023Updated 2 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,551Feb 10, 2026Updated 3 weeks ago
- gather gather gather☆584Mar 15, 2025Updated 11 months ago
- A Game of Hackers (CTF Scoreboard & Game Manager)☆1,090Jul 22, 2025Updated 7 months ago
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago