OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
☆23Nov 22, 2019Updated 6 years ago
Alternatives and similar repositories for juice-shop
Users that are interested in juice-shop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Sep 23, 2015Updated 10 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆54Oct 1, 2015Updated 10 years ago
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆13Jun 24, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- use at your own risk☆38Nov 23, 2019Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- AWS Security Checks☆40Jan 18, 2018Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- A plugin for Burp Suite Pro to work with attacker payloads and automatically generate check digits for credit card numbers and similar nu…☆11Jun 3, 2015Updated 10 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- Source code for Hacker101.com - a free online web and mobile security class.☆16Apr 28, 2022Updated 3 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Yet another subdomain finder☆210Jan 20, 2020Updated 6 years ago
- VBScript minifier☆25Updated this week
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- A program to map out SPF and DKIM records for a large number of domains☆40Apr 1, 2015Updated 10 years ago
- Data from my Sunday streams☆75Jul 28, 2019Updated 6 years ago
- ☆436Dec 2, 2022Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A host-based IDS and network monitoring system (My graduation project)☆26Jul 6, 2021Updated 4 years ago
- Tracklog is a Rails application for managing GPS track logs☆21May 24, 2022Updated 3 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- This repository contains all the Talk slides that I have given at various security conferences, events & meetups.☆34Mar 4, 2021Updated 5 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- Source files for the website☆17Feb 10, 2026Updated last month
- Identify technology on websites.☆60Jun 18, 2023Updated 2 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Mailtrack signature remover for Chromium-based browsers☆16Jul 26, 2022Updated 3 years ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- A collection of useful scripts to prepare a new windows installation for use☆20Jun 18, 2024Updated last year
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated last year
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 6 years ago