"Terrible Thick Client" is a vulnerable application developed in C# .NET framework.
☆20Jul 9, 2023Updated 2 years ago
Alternatives and similar repositories for Terrible-Thick-Client
Users that are interested in Terrible-Thick-Client are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Information Security Information From Web☆28Jul 31, 2025Updated 7 months ago
- damn-exploitable-android-app-apk☆40Jun 9, 2023Updated 2 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆23Jun 12, 2023Updated 2 years ago
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆37May 8, 2022Updated 3 years ago
- A OWASP Based Checklist With 80+ Test Cases☆156Oct 26, 2022Updated 3 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 9 months ago
- A Keylogger Made in Python. Tested on Windows, Linux. windows and linux executable payload generator. Screen shot and custom time delay. …☆16Sep 18, 2022Updated 3 years ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 5 months ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆107Jan 9, 2024Updated 2 years ago
- Nuclei templates for drupal vulns... far from perfect☆19Jan 9, 2025Updated last year
- ☆27Jan 16, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- Vulnerable FastAPI in reference to Opensource Web Application Security Project (OWASP) TOP 10: 2021☆16Jan 3, 2022Updated 4 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Oct 10, 2024Updated last year
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 4 months ago
- Automated blind-xss search for Burp Suite☆22Mar 28, 2022Updated 4 years ago
- ☆14Feb 12, 2026Updated last month
- ☆20Jan 12, 2022Updated 4 years ago
- ☆36Nov 26, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- A collection of Awesome Frida Scripts for MAPT☆20Jan 7, 2023Updated 3 years ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Bcheck scripts for Burp☆29Aug 7, 2024Updated last year
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆91Sep 12, 2023Updated 2 years ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆113Jul 30, 2025Updated 7 months ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 3 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆83May 23, 2022Updated 3 years ago
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆20Apr 6, 2024Updated last year
- ☆10Feb 3, 2021Updated 5 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆43Apr 11, 2025Updated 11 months ago