Vulnerable Task Manager
☆22Jan 14, 2025Updated last year
Alternatives and similar repositories for vtm
Users that are interested in vtm are comparing it to the libraries listed below
Sorting:
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- A free bookmarklet password generator.☆13May 31, 2014Updated 11 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Build beautiful end-to-end encrypted forms for free☆39Oct 2, 2025Updated 5 months ago
- Python library for the Gemini Exchange API☆17Oct 31, 2019Updated 6 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- DNA as an information storage medium using either 4-base codon or binary representations of 256-ASCII☆11Sep 6, 2013Updated 12 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated 2 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- materials we hand out☆147Jul 17, 2025Updated 8 months ago
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- Orchestrator managing Erlang containers and routing Erlang Distribution through itself.☆13Dec 19, 2025Updated 3 months ago
- Responsive Hugo theme inspired in YouTube layout☆11Apr 25, 2023Updated 2 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- QubesOS wiki and simple setup scripts for use by journalists and media organizations.☆20Oct 3, 2024Updated last year
- Let's Encrypt Revocation Event☆13Mar 5, 2020Updated 6 years ago
- "Locks" your MacBook using your charging cable – an alarm is played if unplugged, not more...☆12Jul 25, 2018Updated 7 years ago
- Collection of CTF Writeups☆12Dec 8, 2022Updated 3 years ago
- Filter writeups from ctftime.org by CATegories☆14Nov 4, 2019Updated 6 years ago
- Passphrases is a tool that helps you generate high-entropy passphrases and memorize them using a technique called spaced repetition☆23Mar 25, 2016Updated 9 years ago
- Simple script for PGP encrypted newsletter☆26Feb 13, 2016Updated 10 years ago
- HTTP Request Translator (hrt) translates raw HTTP requests to different scripts (bash, python, etc.)☆17Feb 24, 2017Updated 9 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- A simple threaded Python script that returns the authentication methods supported by each of a list of SSH servers..☆12Jul 29, 2015Updated 10 years ago