Vulnerable Banking Suite
☆169Sep 29, 2025Updated 5 months ago
Alternatives and similar repositories for UnSAFE_Bank
Users that are interested in UnSAFE_Bank are comparing it to the libraries listed below
Sorting:
- ☆13Jan 6, 2020Updated 6 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Oct 18, 2023Updated 2 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Jun 17, 2025Updated 9 months ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆184Apr 19, 2024Updated last year
- Oversecured Vulnerable iOS App☆231Jan 10, 2024Updated 2 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Mar 25, 2024Updated last year
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Mar 31, 2024Updated last year
- ☆14Oct 14, 2022Updated 3 years ago
- Oversecured Vulnerable Android App☆733Jul 18, 2024Updated last year
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆42Apr 11, 2025Updated 11 months ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆737Dec 13, 2023Updated 2 years ago
- ☆15Aug 27, 2020Updated 5 years ago
- VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vul…☆51Feb 19, 2026Updated last month
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated last year
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyber☆406Jul 10, 2024Updated last year
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- docker-compose bringing up multiple vulnerable applications inside containers.☆19Jan 29, 2018Updated 8 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Collection of useful FRIDA Mobile Scripts☆426Aug 10, 2021Updated 4 years ago
- Intentionally vulnerable Android application.☆368Sep 20, 2025Updated 6 months ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Awesome Vulnerable Applications☆1,377Mar 9, 2026Updated last week
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- iPhone security labs☆62Sep 17, 2011Updated 14 years ago
- Damn Vulnerable Java (EE) Application☆147Jan 23, 2024Updated 2 years ago
- Fuzz testing framework for network protocols.☆17May 23, 2020Updated 5 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆107Jan 9, 2024Updated 2 years ago
- An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security …☆224Dec 23, 2021Updated 4 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF☆172Mar 29, 2020Updated 5 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆325Aug 13, 2025Updated 7 months ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS☆449Dec 29, 2025Updated 2 months ago