Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic environment for hands-on drone hacking.
☆399Jan 21, 2026Updated 3 months ago
Alternatives and similar repositories for Damn-Vulnerable-Drone
Users that are interested in Damn-Vulnerable-Drone are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Drone pentesting framework console☆1,943Nov 23, 2024Updated last year
- Collection of scripts and how-to for hacking embedded devices☆23Feb 16, 2026Updated 3 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆23Aug 6, 2023Updated 2 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆117Aug 9, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆35Aug 26, 2024Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- ☆16Jan 9, 2025Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆677Feb 17, 2026Updated 3 months ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Aug 12, 2024Updated last year
- 😎 A curated list of the awesome resources about the security research☆14May 7, 2026Updated last week
- 🌒 Shell command obfuscation to avoid detection systems☆121Oct 10, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A curated list of Capture The Signal CTF related stuff☆17Oct 5, 2021Updated 4 years ago
- ☆10Oct 17, 2020Updated 5 years ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆127Aug 13, 2021Updated 4 years ago
- BackdoorSim: An Educational into Remote Administration Tools☆121Feb 7, 2024Updated 2 years ago
- Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.☆676Nov 25, 2022Updated 3 years ago
- ☆51Mar 13, 2025Updated last year
- 📍 Visualize Flipper Zero recordings on an interacitve map in your browser.☆35Apr 27, 2026Updated 3 weeks ago
- CrackQL is a GraphQL password brute-force and fuzzing utility.☆346Aug 3, 2024Updated last year
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- GraphQL threat framework used by security professionals to research security gaps in GraphQL implementations☆359Jul 1, 2025Updated 10 months ago
- My notes while studying for the PNPT from TCM Security.☆83Mar 30, 2024Updated 2 years ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Oct 6, 2024Updated last year
- ☆402Jul 7, 2024Updated last year
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- This will be a wiki when it grows up, if it grows up☆96Aug 11, 2025Updated 9 months ago
- OT Security Lab for ICS networks☆709Mar 2, 2026Updated 2 months ago
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆21Feb 16, 2023Updated 3 years ago
- A vulnerable node.js application☆42Feb 28, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 6 months ago
- ☆16Mar 26, 2023Updated 3 years ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated 2 years ago
- ☆61Oct 24, 2024Updated last year
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 3 years ago
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Nov 7, 2024Updated last year