Intentionally vulnerable Ruby on Rails web application for learning purposes
☆17Sep 11, 2009Updated 16 years ago
Alternatives and similar repositories for Hacme-Casino
Users that are interested in Hacme-Casino are comparing it to the libraries listed below
Sorting:
- PHP Emulator☆13Dec 18, 2016Updated 9 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- Malware Dump☆21Dec 24, 2016Updated 9 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆37Feb 27, 2026Updated last week
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- ☆15Feb 2, 2025Updated last year
- ☆12Jul 4, 2024Updated last year
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- Assignments for the cryptography engineering course☆12Dec 17, 2013Updated 12 years ago
- The set of root certificates trusted by dart:io's default SecurityContext. Taken from Mozilla's NSS library.☆12Jul 2, 2021Updated 4 years ago
- ☆10Mar 11, 2024Updated last year
- Adding client SOCKS support to Twisted.☆18Feb 2, 2014Updated 12 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- Improved version of David Elliott's SerialKDPProxy☆23Mar 19, 2019Updated 6 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Tool to add .desktop files to be used by optirun☆10Nov 4, 2018Updated 7 years ago
- An Atom theme for a more native experience on OS X 10.10 Yosemite - DEPRECATED☆39Apr 3, 2023Updated 2 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- ☆14Jun 27, 2022Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Lua Pages Template Preprocessor Extension, enables <?lua@client tag that executes Lua scripts in the browser☆19Oct 1, 2018Updated 7 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- Just enough TLS sugar☆14May 2, 2015Updated 10 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Metrics endpoint for erldns.☆12Apr 11, 2025Updated 10 months ago
- ACPI ASL highlighting for vim☆13Jul 30, 2016Updated 9 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- ☆10Aug 5, 2015Updated 10 years ago
- ZK -- The Halls Of ZK☆15Nov 6, 2023Updated 2 years ago
- Python wrapper for gatttool from BlueZ to access Bluetooth LE Devices☆12Nov 13, 2015Updated 10 years ago