Vulnerable Task Manager
☆22Jan 14, 2025Updated last year
Alternatives and similar repositories for vtm
Users that are interested in vtm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated this week
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Materials used in preperation for the BSCP certification from PortSwigger☆18Jan 28, 2022Updated 4 years ago
- Jumpstart multiple WebSocket servers quickly☆33Nov 23, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- A free bookmarklet password generator.☆14May 31, 2014Updated 11 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- A cheatsheet for exploiting server-side SVG rasterization.☆30Jul 5, 2022Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Mar 16, 2026Updated 3 weeks ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- OWASP Ontology-driven Threat Modelling framework☆41Jul 11, 2023Updated 2 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- materials we hand out☆147Jul 17, 2025Updated 8 months ago
- Orchestrator managing Erlang containers and routing Erlang Distribution through itself.☆13Dec 19, 2025Updated 3 months ago
- Responsive Hugo theme inspired in YouTube layout☆11Apr 25, 2023Updated 2 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Let's Encrypt Revocation Event☆13Mar 5, 2020Updated 6 years ago
- "Locks" your MacBook using your charging cable – an alarm is played if unplugged, not more...☆12Jul 25, 2018Updated 7 years ago
- Collection of CTF Writeups☆12Dec 8, 2022Updated 3 years ago
- Filter writeups from ctftime.org by CATegories☆14Nov 4, 2019Updated 6 years ago
- Passphrases is a tool that helps you generate high-entropy passphrases and memorize them using a technique called spaced repetition☆23Mar 25, 2016Updated 10 years ago
- HTTP Request Translator (hrt) translates raw HTTP requests to different scripts (bash, python, etc.)☆17Feb 24, 2017Updated 9 years ago
- ☆21May 13, 2019Updated 6 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A simple threaded Python script that returns the authentication methods supported by each of a list of SSH servers..☆12Jul 29, 2015Updated 10 years ago
- Malaysia Elite Hacker Team☆11Jan 29, 2025Updated last year
- Burp Suite Extension to monitor new scope☆16Mar 31, 2021Updated 5 years ago
- Vectorized implementation of a general feedforward neural network in Python☆10Jan 22, 2017Updated 9 years ago
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Rate limiting for Ash actions.☆17Apr 1, 2026Updated last week
- ☆15Jan 10, 2019Updated 7 years ago