spinkham / Hacme-CasinoView external linksLinks
Intentionally vulnerable Ruby on Rails web application for learning purposes
☆17Sep 11, 2009Updated 16 years ago
Alternatives and similar repositories for Hacme-Casino
Users that are interested in Hacme-Casino are comparing it to the libraries listed below
Sorting:
- A small webserver vulnerable to insecure deserialization☆20Nov 30, 2017Updated 8 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- initial upload☆19Jul 7, 2015Updated 10 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Wear a 6th finger to make surveillance footage look like it's AI generated☆40Aug 3, 2024Updated last year
- ☆10Sep 24, 2021Updated 4 years ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- ☆10Mar 11, 2024Updated last year
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- ACPI ASL highlighting for vim☆13Jul 30, 2016Updated 9 years ago
- Maltego transforms for the Steam community☆12Aug 5, 2017Updated 8 years ago
- Analizador de tráfico para dispositivos Android potencialmente comprometidos como parte de una botnet orientado a detectar ataques DDoS.☆13Jun 20, 2018Updated 7 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- [ARCHIVED] DMCA notices, and tools for publishing them☆12Apr 28, 2020Updated 5 years ago
- Redirect to webassembly.org☆12Aug 22, 2022Updated 3 years ago
- [ARCHIVED] IPFS Stress tests☆10Apr 16, 2020Updated 5 years ago
- Python wrapper for gatttool from BlueZ to access Bluetooth LE Devices☆12Nov 13, 2015Updated 10 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- A dapp for creators managing media rights☆10Sep 12, 2016Updated 9 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 9 months ago
- SSE to Stdio MCP Proxy Server☆17Jun 9, 2025Updated 8 months ago
- Improved version of David Elliott's SerialKDPProxy☆23Mar 19, 2019Updated 6 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Just enough TLS sugar☆14May 2, 2015Updated 10 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Vulnerable ASP.NET Core 2.0 App☆11Jul 12, 2023Updated 2 years ago
- Notes relating to secure messaging☆19Jun 11, 2016Updated 9 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- ☆10Mar 31, 2016Updated 9 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- An Atom theme for a more native experience on OS X 10.10 Yosemite - DEPRECATED☆39Apr 3, 2023Updated 2 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ☆13Jun 27, 2022Updated 3 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 7 years ago
- ☆14Feb 20, 2025Updated 11 months ago