"Terrible Thick Client" is a vulnerable application developed in C# .NET framework.
☆20Jul 9, 2023Updated 2 years ago
Alternatives and similar repositories for Terrible-Thick-Client
Users that are interested in Terrible-Thick-Client are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Information Security Information From Web☆28Jul 31, 2025Updated 9 months ago
- damn-exploitable-android-app-apk☆40Jun 9, 2023Updated 2 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆23Jun 12, 2023Updated 2 years ago
- A OWASP Based Checklist With 80+ Test Cases☆197Oct 26, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Keylogger Made in Python. Tested on Windows, Linux. windows and linux executable payload generator. Screen shot and custom time delay. …☆16Sep 18, 2022Updated 3 years ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 6 months ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆106Jan 9, 2024Updated 2 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆15Jun 24, 2025Updated 10 months ago
- Nuclei templates for drupal vulns... far from perfect☆19Jan 9, 2025Updated last year
- ☆28Jan 16, 2026Updated 3 months ago
- Vulnerable FastAPI in reference to Opensource Web Application Security Project (OWASP) TOP 10: 2021☆16Jan 3, 2022Updated 4 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Oct 10, 2024Updated last year
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- Automated blind-xss search for Burp Suite☆22Mar 28, 2022Updated 4 years ago
- ☆14Feb 12, 2026Updated 2 months ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- ☆36Nov 26, 2024Updated last year
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 6 months ago
- Pentesting APIs, Published by Packt☆18Aug 20, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- converts sRDI compatible dlls to shellcode☆38Jan 20, 2025Updated last year
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆91Sep 12, 2023Updated 2 years ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆113Jul 30, 2025Updated 9 months ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 5 months ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 7 months ago
- A simple pentest container equipped with common python pentest tools.☆43Jan 30, 2026Updated 3 months ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated last year
- Beacon Object File allowing creation of Beacons in different sessions.☆84May 23, 2022Updated 3 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆44Apr 11, 2025Updated last year
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆73Sep 10, 2023Updated 2 years ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 3 years ago
- ☆26Sep 1, 2022Updated 3 years ago