Intentionally vulnerable Ruby on Rails web application for learning purposes
☆17Sep 11, 2009Updated 16 years ago
Alternatives and similar repositories for Hacme-Casino
Users that are interested in Hacme-Casino are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- A vulnerable Play application for attackers.☆18Updated this week
- whois.cynthia.re V2☆13May 23, 2021Updated 4 years ago
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- ☆14Mar 19, 2024Updated 2 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 11 months ago
- reaveal-js component for React. Pass markdown or markup for creating reveal-js presentations.☆11Nov 19, 2016Updated 9 years ago
- Plugin metademands for GLPI☆12Mar 18, 2026Updated last week
- A mass communicator module for the WiFi Pineapple that utilizes TLS to control a botnet of compromised systems.☆15Jul 18, 2020Updated 5 years ago
- Utilities for sniffing bluetooth low-energy (BLE) packets using a CC2540 USB sniffer dongle☆28Jul 8, 2020Updated 5 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Mar 26, 2015Updated 11 years ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆14May 10, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Saltstack AWS creates all the non-server components of a AWS hosted datacenter☆11Aug 23, 2018Updated 7 years ago
- Ping Monster v1.9 - a freeware ping monitoring tool, with some alert actions like: send email, sound alert, http post.☆11Sep 6, 2023Updated 2 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 3 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ☆14Feb 20, 2025Updated last year
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Integrated MALware Simulator and Emulator☆13Dec 10, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆45Feb 27, 2026Updated last month
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- flask-webgoat is a deliberately-vulnerable application written with the Flask web framework.☆19Sep 5, 2025Updated 6 months ago
- eda-3 from many years ago☆14Sep 5, 2014Updated 11 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 10 years ago
- This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).☆22Mar 17, 2026Updated last week
- Wireless Network Security Analysis Tool☆16Apr 27, 2025Updated 11 months ago
- Pardus Lightdm Greeter☆12Feb 27, 2026Updated last month
- UNIVERSAL INSTALLER for penguins-eggs on AlmaLinux, Arch, Debian, Devuan, Fedora, Manjaro, openSuSE, RockyLinux, Ubuntu and derivatives☆21Mar 21, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Master password for openSSH service☆16May 30, 2019Updated 6 years ago
- Creating a Bind Shell in C☆20Aug 21, 2023Updated 2 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- ☆16Feb 2, 2025Updated last year
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- Python library that implements DKIM (DomainKeys Identified Mail) email signing and verification☆19Mar 4, 2013Updated 13 years ago