Broken web app intentionally built with pentesting obstacles
☆15Jun 21, 2019Updated 6 years ago
Alternatives and similar repositories for NastyWebHackme
Users that are interested in NastyWebHackme are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Meltdown and spectre explained -- for normal people☆10Sep 12, 2018Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- ☆18Mar 20, 2017Updated 9 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- IDA AArch64 processor extender extension: Adding crypto extension instructions (AES/SHA1/SHA256)☆24Nov 26, 2016Updated 9 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆41Sep 6, 2015Updated 10 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- MessageBox files (EXE, DLL) for testing purposes.☆13Mar 9, 2019Updated 7 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- A taster of TTWE☆18Sep 1, 2014Updated 11 years ago
- A Bash Script that parses through a PCAP file and automatically outputs valuable information about the Network Traffic.☆13May 28, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Aug 4, 2016Updated 9 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago