a vulnerable web for education of hacking
☆11Feb 7, 2021Updated 5 years ago
Alternatives and similar repositories for SVWA
Users that are interested in SVWA are comparing it to the libraries listed below
Sorting:
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- A vulnerable Play application for attackers.☆18Updated this week
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 2 years ago
- Wordpress Malware Scanner☆30Apr 12, 2021Updated 4 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- ☆11Jan 28, 2023Updated 3 years ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- Tutorial Linux x64 Assembly Bahasa Indonesia☆38May 21, 2024Updated last year
- Panduan singkat untuk memulai belajar reverse engineering terutama software reversing atau reverse code engineering.☆103Oct 4, 2020Updated 5 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- Automatically find and clip the most engaging parts of YouTube videos using heatmap-based viewer interaction data.☆33Jan 9, 2026Updated last month
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vul…☆50Feb 19, 2026Updated 2 weeks ago
- ☆14Feb 2, 2022Updated 4 years ago
- SheepDB is a lightweight service that uses Google Spreadsheets as a storage backend. It provides an API server for managing your data.☆11Feb 17, 2025Updated last year
- Kamus Besar Bahasa Indonesia☆11Aug 26, 2025Updated 6 months ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- load mixed assemblies (.NET) C# source code☆14Sep 3, 2017Updated 8 years ago
- JIT extensions for AsmResolver☆14May 19, 2019Updated 6 years ago
- ☆10Aug 6, 2019Updated 6 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15May 3, 2020Updated 5 years ago
- CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session managemen…☆15Sep 6, 2024Updated last year
- The dexdump tool☆17Dec 27, 2013Updated 12 years ago
- Pler - Domain Probe and Cloudflare Filter Tool. Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare…☆22Aug 12, 2025Updated 6 months ago
- ☆15Updated this week
- ☆12Dec 14, 2021Updated 4 years ago
- The Official Repository for BanditHijo (R)-Chive v1☆13Jan 14, 2026Updated last month
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- A simple and universal .NET proxy remover☆11Jun 14, 2020Updated 5 years ago
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Mar 28, 2022Updated 3 years ago
- Kamus Besar Bahasa Indonesia Wrapper For NPM Package.☆11Updated this week