Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic environment for hands-on drone hacking.
☆390Jan 21, 2026Updated 3 months ago
Alternatives and similar repositories for Damn-Vulnerable-Drone
Users that are interested in Damn-Vulnerable-Drone are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of awesome drone hacking tools & resources.☆63Jul 14, 2025Updated 9 months ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated 2 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Files and Programs for UAV and Drone Cybersecurity Workshop☆39Sep 6, 2023Updated 2 years ago
- Drone pentesting framework console☆1,921Nov 23, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of scripts and how-to for hacking embedded devices☆23Feb 16, 2026Updated 2 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆32Aug 26, 2024Updated last year
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆19Nov 8, 2024Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆679Feb 17, 2026Updated 2 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last month
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Aug 12, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 😎 A curated list of the awesome resources about the security research☆14Updated this week
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- A curated list of Capture The Signal CTF related stuff☆17Oct 5, 2021Updated 4 years ago
- ☆10Oct 17, 2020Updated 5 years ago
- BackdoorSim: An Educational into Remote Administration Tools☆120Feb 7, 2024Updated 2 years ago
- Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.☆673Nov 25, 2022Updated 3 years ago
- ☆49Mar 13, 2025Updated last year
- CrackQL is a GraphQL password brute-force and fuzzing utility.☆346Aug 3, 2024Updated last year
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- GraphQL threat framework used by security professionals to research security gaps in GraphQL implementations☆357Jul 1, 2025Updated 9 months ago
- My notes while studying for the PNPT from TCM Security.☆82Mar 30, 2024Updated 2 years ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Oct 6, 2024Updated last year
- ☆402Jul 7, 2024Updated last year
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- OT Security Lab for ICS networks☆698Mar 2, 2026Updated last month
- This will be a wiki when it grows up, if it grows up☆96Aug 11, 2025Updated 8 months ago
- ☆26Aug 23, 2023Updated 2 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Dec 8, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A vulnerable node.js application☆42Feb 28, 2024Updated 2 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 6 months ago
- ☆16Mar 26, 2023Updated 3 years ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated 2 years ago
- ☆61Oct 24, 2024Updated last year
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 3 years ago