A Deliberately Insecure Web Application
☆74Jan 9, 2020Updated 6 years ago
Alternatives and similar repositories for diwa
Users that are interested in diwa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A multi-functional toolkit for social engineering, phishing, email spoofing, SMS/OTP bombing, keylogging, and security audits — built for…☆33Mar 11, 2026Updated last month
- Simple script for web directory scanning☆33Apr 23, 2026Updated 2 weeks ago
- A general Javascript keylogger to be used in an XSS PoC☆18Feb 23, 2020Updated 6 years ago
- This is the word list for fuzzing kubernetes.☆15Nov 11, 2023Updated 2 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- Re-key Salt masters and minions☆11May 14, 2020Updated 5 years ago
- A tool to do basic fingerprinting across a large number of hosts☆11Oct 20, 2020Updated 5 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Ethical hacking practices used to explore vulnerabilities in smart contracts, in order to enhance security measures against potential thr…☆26Jan 8, 2024Updated 2 years ago
- This is a script to insert blackarch URL into Archlinux In termux :D☆58Nov 30, 2017Updated 8 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Exfiltrate data using ping and PowerShell, no admin access required☆15Mar 26, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆25Aug 11, 2020Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- SQLMap tamper api to accept tamper scripts from all languages☆60Mar 16, 2018Updated 8 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Salt Stack modules☆15Sep 26, 2015Updated 10 years ago
- Docker baseimage for GTK3 Broadway☆15Nov 10, 2022Updated 3 years ago
- TCD1304 device provides highly reproducible, linear response for precision photo-/radio-metric spectrometry and holographic imaging. Incl…☆41Updated this week
- An Unsigned Driver Mapper for Windows 10 22H2 -> Windows 11 23H2 that uses PdFwKrnl to exploit the Read/Write IOCTL Calls to disable DSE …☆28Aug 2, 2024Updated last year
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Easy Anti PatchGuard☆10Apr 9, 2021Updated 5 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- An XMLRPC brute forcer targeting Wordpress written in Python 3. (DISCONTINUED)☆64Aug 3, 2025Updated 9 months ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Apr 24, 2026Updated 2 weeks ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆55Jan 18, 2020Updated 6 years ago
- ☆13May 17, 2020Updated 5 years ago
- Lib for parsing web pages to find images in specified locations and downloading them simultaneously or sequentially. Picture downloader a…☆17Dec 12, 2013Updated 12 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆43Nov 18, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- ⚙️ Chromedriver binaries for InstaPy☆14Jan 25, 2019Updated 7 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- Go syllable counter.☆15Apr 18, 2025Updated last year
- Complete solution for intentionally vulnerable webshop: "Juice Shop"☆99Feb 18, 2016Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago