mpirnat / lets-be-bad-guysView external linksLinks
A deliberately-vulnerable website and exercises for teaching about the OWASP Top 10
☆188Jul 18, 2024Updated last year
Alternatives and similar repositories for lets-be-bad-guys
Users that are interested in lets-be-bad-guys are comparing it to the libraries listed below
Sorting:
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 13 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- A utility to perform dictionary attacks against the VoIP SIP Register hash☆14Mar 16, 2016Updated 9 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- Tool for scanning Cisco router products over SSH☆55Dec 17, 2014Updated 11 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Sep 13, 2018Updated 7 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Hardening Tool for *nixes☆50Apr 22, 2017Updated 8 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A bot that offers sympathy to people who have suffered paper cuts.☆17Oct 6, 2012Updated 13 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- A dapp for creators managing media rights☆10Sep 12, 2016Updated 9 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- CVE-2015-3152 PoC☆43May 11, 2015Updated 10 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 9 years ago
- Periodically scan target ranges using nmap, ndiff and emailing changes☆11Jan 13, 2017Updated 9 years ago
- Turn your two-bit doodles into fine artworks with deep neural networks, generate seamless textures from photos, transfer style from one i…☆11May 7, 2016Updated 9 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆27Apr 30, 2011Updated 14 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 9 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago