Security Payload Unit Test Repository (SPUTR)
☆87Feb 18, 2026Updated 2 weeks ago
Alternatives and similar repositories for sputr
Users that are interested in sputr are comparing it to the libraries listed below
Sorting:
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 3 months ago
- ☆57Jun 17, 2020Updated 5 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- A Pastebin scraper designed to look for malicious content☆20Nov 20, 2019Updated 6 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Aug 26, 2025Updated 6 months ago
- goSDL☆522Nov 3, 2025Updated 4 months ago
- materials we hand out☆147Jul 17, 2025Updated 7 months ago
- A Python3 based single-file subdomain enumerator☆90Oct 5, 2019Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Lab Material for the Two-Day Defending Modern DevOps Environments Course☆126Dec 4, 2019Updated 6 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24May 10, 2025Updated 9 months ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- Recon system hardening scanner☆47Sep 9, 2016Updated 9 years ago
- A static website template for security pages.☆54Jul 19, 2025Updated 7 months ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Jun 6, 2016Updated 9 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- cloud-based interactive security exercises☆14Jul 13, 2020Updated 5 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Serial Whitelist Application Trainer☆30Jul 7, 2019Updated 6 years ago
- Code Pulse is a real-time code coverage tool for penetration testing activities☆122Dec 7, 2022Updated 3 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago