Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.
☆171Nov 17, 2023Updated 2 years ago
Alternatives and similar repositories for web-hacking-playground
Users that are interested in web-hacking-playground are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10May 20, 2025Updated 10 months ago
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- This is a demo of how to protect and hide processes by using various techniques on Windows platform☆10Nov 1, 2020Updated 5 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- Scripts and piece of codes used for Active Directory configuration☆82Feb 14, 2023Updated 3 years ago
- The motive to build this repo is to help beginner to start learn Android Pentesting by providing a roadmap.☆439Jul 11, 2022Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Jan 10, 2023Updated 3 years ago
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆30Mar 23, 2026Updated 2 weeks ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- ☆12Nov 15, 2021Updated 4 years ago
- utility to serve/generate cfwarp+ keys☆14Oct 3, 2024Updated last year
- Smart context-based SSRF vulnerability scanner.☆360May 5, 2022Updated 3 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Apr 13, 2024Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,420Jan 19, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Kraken, a modular multi-language webshell coded by @secu_x11☆551Feb 10, 2024Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆164Oct 8, 2025Updated 6 months ago
- A simple tool for bypassing file upload restrictions.☆899Jul 22, 2024Updated last year
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- Script for generating revshells☆478Sep 10, 2024Updated last year
- A source code static analysis platform for AppSec enthusiasts.☆270Apr 3, 2026Updated last week
- Never forget where you inject.☆299Aug 15, 2025Updated 7 months ago