A reinforced version of the Wavsep evaluation platform.
☆19Jul 26, 2024Updated last year
Alternatives and similar repositories for Reinforced-Wavsep
Users that are interested in Reinforced-Wavsep are comparing it to the libraries listed below
Sorting:
- ☆13Sep 22, 2022Updated 3 years ago
- 面向项目版本差异性的漏洞识别技术研究☆14Mar 29, 2022Updated 3 years ago
- ☆28Feb 7, 2021Updated 5 years ago
- OWASP Benchmark Project Utilities - Provides scorecard generation and crawling tools for Benchmark style test suites.☆20Updated this week
- A repo which contains lots of things which it shouldn't☆43Oct 23, 2019Updated 6 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- ☆21Jan 16, 2024Updated 2 years ago
- Botnet targeting Windows machines 🐍☆46Feb 25, 2026Updated 3 weeks ago
- Macos Malware Samples☆61Feb 22, 2021Updated 5 years ago
- Web Input Vector Extractor Teaser☆132Jan 6, 2022Updated 4 years ago
- Yet another content discovery tool☆119Nov 16, 2024Updated last year
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated 2 months ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- inject or convert shellcode to PE☆41Oct 14, 2019Updated 6 years ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated last month
- ☆10Jul 21, 2021Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Detectify Crowdsource Challenge☆72Apr 26, 2022Updated 3 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated last month
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- ☆16Aug 20, 2017Updated 8 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆16Jan 8, 2019Updated 7 years ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- Collection of tool to find and exploit exposed SickChill/Rage instances☆18Jan 21, 2019Updated 7 years ago
- Private keys that have become public ...☆21Jun 8, 2022Updated 3 years ago
- ☆14Oct 19, 2025Updated 5 months ago
- A vulnerable Play application for attackers.☆18Mar 3, 2026Updated 2 weeks ago
- A small deauth script written in ruby that uses "Packetgen" to send deauth packets to a client on a network☆15Mar 10, 2021Updated 5 years ago
- Android Malware Samples☆118Feb 6, 2021Updated 5 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 10 months ago
- A Microservices-based framework for the study of Network Security and Penetration Test techniques☆628Mar 13, 2026Updated last week
- A cli utility to enable piping content into an Obsidian vault, adding frontmatter on the way.☆21Mar 2, 2026Updated 2 weeks ago
- a physical pentesting toolkit on a regular Raspberry Pi Pico☆15Jun 25, 2024Updated last year
- https://github.com/tatsu-lab/stanford_alpaca☆14Mar 19, 2023Updated 3 years ago
- Plugins for my pwnagotchi projects☆15Mar 15, 2025Updated last year
- A (purpousely) vulnerable, social-media-like, django web application☆12Jun 10, 2021Updated 4 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆20Oct 31, 2018Updated 7 years ago