A curated list of hacking environments where you can train your cyber skills legally and safely
☆96May 2, 2020Updated 5 years ago
Alternatives and similar repositories for Pentest-practice
Users that are interested in Pentest-practice are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Mar 7, 2019Updated 7 years ago
- ☆55Aug 22, 2017Updated 8 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cool resources and content for bug bounty hunting.☆19Oct 1, 2021Updated 4 years ago
- Generate Multiple Nessus Activation Code using Temp Mail Service.☆29Dec 8, 2017Updated 8 years ago
- Repository contains an online education portal filled with web vulnerabilities.☆21Jan 3, 2020Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The community app for eXch.cx website☆17Nov 22, 2024Updated last year
- ☆46Oct 7, 2021Updated 4 years ago
- Port of Brian Bennet's NES Emulator for the second generation Panologic thin client☆13Apr 21, 2022Updated 3 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 10 months ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆19Jun 27, 2022Updated 3 years ago
- Sample apps taken from Windows Server 2003 and running in Docker Windows containers☆16Aug 24, 2018Updated 7 years ago
- your offsec knowledge☆485Oct 9, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of open source and commercial tools that aid in red team operations.☆51May 25, 2020Updated 5 years ago
- An open-source knowledge base for security researchers.☆18Jan 8, 2025Updated last year
- Python Digital Forensics [video], published by Packt☆21Jan 30, 2023Updated 3 years ago
- 🧠Neocortex is a tool to connect your cognitive service (e.g. DialogFlow) 🤖 with your communication channels (like facebook) 📞to create…☆27Dec 15, 2023Updated 2 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- Tools that i use n love :D☆18Jun 5, 2020Updated 5 years ago
- A collection of portable ANSI C code for communicating with Digi International's XBee wireless radio modules in API mode.☆16Feb 27, 2024Updated 2 years ago
- ☆24Updated this week
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Jan 7, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Aug 24, 2019Updated 6 years ago
- A comprehensive curated list of available Blockchain Bug Bounty Programs.☆79Feb 22, 2019Updated 7 years ago
- ☆28Jul 5, 2023Updated 2 years ago
- String-based secret-searching tool (high entropy and regexes) based on truffleHog☆17Oct 21, 2021Updated 4 years ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated last year
- Carbon Black Response IR tool☆55Dec 10, 2020Updated 5 years ago
- Video4Linux GNU Radio plugin☆21Jan 24, 2014Updated 12 years ago