Simple vulnearable Flask web application
☆29Dec 30, 2025Updated 2 months ago
Alternatives and similar repositories for breakableflask
Users that are interested in breakableflask are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scapy Penetration testing scripts☆21May 26, 2015Updated 10 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code in…☆12Aug 21, 2022Updated 3 years ago
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆40Jan 29, 2026Updated last month
- This repository include Docker Machines for practicing on some of the Web Attacks.☆14Nov 20, 2023Updated 2 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- Sql injection vulnerability scanner☆12Aug 27, 2020Updated 5 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks. Version > 80 is supported.☆13Jun 5, 2020Updated 5 years ago
- ssh protector. to build dynamtic iptables 小黑屋,专门收集肉鸡的ip地址☆16Jun 16, 2020Updated 5 years ago
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- Web attack vectors collection☆20Nov 1, 2020Updated 5 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Feb 7, 2024Updated 2 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Code and materials for the talk "Set practice: coding & using sets in Go"☆11Jul 8, 2025Updated 8 months ago
- SQL Injection vulnerabilites can cause a lot of damage to a web application. A malicious user can possibly view records, delete records, …☆31Oct 8, 2013Updated 12 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆47Feb 16, 2024Updated 2 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- A Django vulnerable Web application for testing the w3af framework☆32Jul 6, 2022Updated 3 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Oct 13, 2022Updated 3 years ago
- Hook for the PoC for exploiting CVE-2024-32002☆16May 19, 2024Updated last year
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- A httpbin reimplementation in rust☆10Dec 29, 2018Updated 7 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Proposta de solução do TFC em Engenharia Informática pela ESPU-UNIKIVI, 02-2018☆10Jan 9, 2021Updated 5 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Universally Unique Lexicographically Sortable Identifier for Lua☆19Mar 28, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- ☆34Mar 14, 2019Updated 7 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- Spring boot CRUD (Create, Read, Update, Delete) demo application with cassandra DB and API documentation using Swaager and OpenAPI UI☆11Sep 3, 2020Updated 5 years ago
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated 11 months ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Tool to search possible emails indexed throught API's Hunter.io (https://hunter.io)☆31May 22, 2023Updated 2 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago