Vulnerable Task Manager
☆22Jan 14, 2025Updated last year
Alternatives and similar repositories for vtm
Users that are interested in vtm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- Security Payload Unit Test Repository (SPUTR)☆87Feb 18, 2026Updated 2 months ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Materials used in preperation for the BSCP certification from PortSwigger☆20Jan 28, 2022Updated 4 years ago
- DISCONTINUED: openweathermap.com implementation for Spark-Core☆17Apr 26, 2016Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Jumpstart multiple WebSocket servers quickly☆33Nov 23, 2021Updated 4 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- Emulate native integer and floating-point types in Python☆20May 15, 2023Updated 2 years ago
- Living of the Land of Free SaaS☆71Mar 22, 2026Updated last month
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- ☆16May 3, 2024Updated last year
- Static Token And Credential Scanner☆95May 8, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- DNA as an information storage medium using either 4-base codon or binary representations of 256-ASCII☆11Sep 6, 2013Updated 12 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Quickly build and deploy a map in any environment☆16Apr 22, 2020Updated 6 years ago
- https://hackaday.io/project/26823-lameboy-another-esp12-handheld☆20Sep 8, 2024Updated last year
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- materials we hand out☆147Jul 17, 2025Updated 9 months ago
- Responsive Hugo theme inspired in YouTube layout☆11Apr 25, 2023Updated 3 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- Filter writeups from ctftime.org by CATegories☆14Nov 4, 2019Updated 6 years ago
- HTTP Request Translator (hrt) translates raw HTTP requests to different scripts (bash, python, etc.)☆17Feb 24, 2017Updated 9 years ago
- The first user customizable multi-cryptocurrency paper wallet. Supporting: Bitcoin, Litecoin, Ethereum, Monero, EOS and Ardor Ignis.☆20Jan 17, 2024Updated 2 years ago
- ☆18Aug 21, 2018Updated 7 years ago
- ☆21May 13, 2019Updated 6 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Unlike / unfavorite tweets at a rate of 600 per hour.☆20May 18, 2016Updated 9 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.☆23Sep 4, 2023Updated 2 years ago
- A simple threaded Python script that returns the authentication methods supported by each of a list of SSH servers..☆12Jul 29, 2015Updated 10 years ago
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- Burp Suite Extension to monitor new scope☆16Mar 31, 2021Updated 5 years ago
- Hacking and Securing Java☆80Jan 24, 2019Updated 7 years ago