A deliberately vulnerable website used to showcase Dastardly from Burp Suite
☆10Oct 6, 2025Updated 5 months ago
Alternatives and similar repositories for vulnerable-site
Users that are interested in vulnerable-site are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jun 25, 2024Updated last year
- Public release of the challenge repo from SunshineCTF 2022.☆15Dec 6, 2022Updated 3 years ago
- ☆15Jul 23, 2024Updated last year
- Scripts for bug bounty-ing and attack surface mapping☆13Jan 10, 2022Updated 4 years ago
- Man in the middle attack demo☆11Jan 14, 2018Updated 8 years ago
- A community-driven Solr stopwords collection☆21Jun 1, 2011Updated 14 years ago
- CatSniffer is an original multiprotocol and multiband board made for sniffing and communicating with IoT (Internet of Things) devices. It…☆17Aug 17, 2021Updated 4 years ago
- Basic step-by-step to run .NET Core app on Heroku (auto-deploy from Github)☆13Aug 8, 2018Updated 7 years ago
- CoolAJ86 on Github☆18Jan 7, 2017Updated 9 years ago
- This is a simple scanner application that currently supports the following SDR devices: Ettus B210, Nuand BladeRF, Airspy, SdrPlay, and H…☆21Jul 21, 2017Updated 8 years ago
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆26Oct 23, 2024Updated last year
- ☆24Dec 16, 2020Updated 5 years ago
- Action to execute jFrog CLI commands for Artifactory☆12Nov 9, 2022Updated 3 years ago
- This repository is deprecated☆16Jul 15, 2022Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30May 24, 2020Updated 5 years ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆99Jul 10, 2021Updated 4 years ago
- Information about the hardware of the Coway AP-1512HH Air Purifier☆31Jul 15, 2024Updated last year
- Repository of Azure Search Demo's☆24Jun 22, 2022Updated 3 years ago
- ☆40Jul 1, 2025Updated 8 months ago
- ☆48Jan 7, 2014Updated 12 years ago
- VulnBox is a container that is intentionally designed with vulnerabilities to allow security professionals to practice and improve their …☆17Aug 23, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- PYPrime is an open source python based CPU and RAM benchmark☆30Jun 11, 2024Updated last year
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆18Sep 19, 2021Updated 4 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Azure Table Storage Target for NLog☆26Feb 1, 2018Updated 8 years ago
- Code used in the Welcome to Azure module for Microsoft Learn☆23Jan 15, 2025Updated last year
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Orca | Docker workshop☆32Nov 29, 2023Updated 2 years ago
- Context-Aware RAG library for Knowledge Graph ingestion and retrieval functions.☆59Mar 16, 2026Updated last week
- Code used in our AWS Certified Security Specialty course☆32Jan 9, 2026Updated 2 months ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- A site for CISA directives☆168Jun 5, 2024Updated last year
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Burp extension that checks for interesting and security headers☆44Aug 12, 2020Updated 5 years ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆53Updated this week
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Aug 18, 2021Updated 4 years ago
- ☆12Oct 29, 2015Updated 10 years ago