Pretty vulnerable flask app..
☆22Oct 30, 2018Updated 7 years ago
Alternatives and similar repositories for flask-vuln
Users that are interested in flask-vuln are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- Simple vulnearable Flask web application☆30Dec 30, 2025Updated 4 months ago
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code in…☆12Aug 21, 2022Updated 3 years ago
- Intentionally Vulnerable Flask app for use in Demos☆34Feb 7, 2026Updated 3 months ago
- ☆17Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Challenges for INShAck 2018☆25May 11, 2019Updated 6 years ago
- A Django vulnerable Web application for testing the w3af framework☆32Jul 6, 2022Updated 3 years ago
- Sql injection vulnerability scanner☆12Aug 27, 2020Updated 5 years ago
- ☆11May 28, 2020Updated 5 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Security Research☆94Jul 2, 2025Updated 10 months ago
- ☆15Jul 5, 2020Updated 5 years ago
- Github action that installs SDKs served up by the AdoptOpenJDK API☆12May 8, 2024Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆18Mar 27, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- CIS Benchmark Audit Scripts☆25Jan 4, 2018Updated 8 years ago
- Web attack vectors collection☆20Nov 1, 2020Updated 5 years ago
- ☆11Oct 19, 2018Updated 7 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- Change code blocks to look more like a terminal☆10Jun 14, 2017Updated 8 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- Demo of the Newspaper article extraction library.☆29Nov 17, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is a compilation of functions to simplify scripts to manage AD tasks☆10Apr 7, 2016Updated 10 years ago
- ☆17Oct 30, 2022Updated 3 years ago
- Burp plugin for jxscout☆21May 12, 2025Updated 11 months ago
- Self-organized P2P ride sharing community☆12Dec 3, 2024Updated last year
- CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。☆13Dec 29, 2020Updated 5 years ago
- 御剑算号破解激活工具☆12Mar 20, 2019Updated 7 years ago
- API for Asset Service☆14Aug 15, 2024Updated last year
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A NASA TV still frame viewer☆14Nov 26, 2023Updated 2 years ago
- A tool for automated security scanning of web applications. Many features are also present for manual penetration testing.☆30Aug 29, 2014Updated 11 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆14Dec 11, 2017Updated 8 years ago
- Magento shoplift exploit is vulnerability which was discovered by CheckPoint team (http://blog.checkpoint.com/2015/04/20/analyzing-magent…☆13Aug 25, 2015Updated 10 years ago