gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC security.
☆51Sep 22, 2025Updated 5 months ago
Alternatives and similar repositories for grpc-goat
Users that are interested in grpc-goat are comparing it to the libraries listed below
Sorting:
- ☆14Nov 8, 2024Updated last year
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆17Updated this week
- ☆13Oct 24, 2024Updated last year
- Network Fuzzing Framework☆64Jan 17, 2026Updated last month
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆22Apr 23, 2025Updated 10 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Proxy Management for Security Professionals☆24Mar 25, 2025Updated 11 months ago
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- Impacket☆49Feb 25, 2026Updated last week
- A BurpSuite extension that allows you to use Chromium with PwnFox☆42Dec 23, 2025Updated 2 months ago
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated 11 months ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Aug 20, 2024Updated last year
- A tool for fetching DFIR and other GitHub tools.☆25Aug 2, 2025Updated 7 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago
- JScripter is a Python script designed to scrape and save unique JavaScript files from a list of URLs or a single URL.☆29Nov 26, 2024Updated last year
- Vulnerable Android application for Ostolab Security Scanner☆35Jan 30, 2026Updated last month
- Python-based web scraper for a darkweb marketplace on the Tor network.☆39Sep 12, 2024Updated last year
- ☆41Sep 9, 2023Updated 2 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- ☆12Jun 26, 2023Updated 2 years ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated last week
- Learning materials, vulnerable demo app, and scripts related to the Client-Side Injections Part II YouTube Video☆29Oct 25, 2025Updated 4 months ago
- Python script implementing the favicon hash trick to find subdomains.☆39Mar 28, 2023Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 5 months ago
- Purple-team telemetry & simulation toolkit.☆108Dec 16, 2025Updated 2 months ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- A simple Python script to do quick, targeted recon of a given domain.☆70Apr 17, 2025Updated 10 months ago
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆58Feb 24, 2026Updated last week
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13Updated this week
- ☆19Jul 14, 2025Updated 7 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆17Sep 4, 2023Updated 2 years ago
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 3 months ago