Damn Vulnerable WordPress
☆198Dec 23, 2023Updated 2 years ago
Alternatives and similar repositories for dvwp
Users that are interested in dvwp are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 3 years ago
- A simple web app with a XXE vulnerability.☆231Nov 10, 2021Updated 4 years ago
- Pentesting/Bugbounty Dockerfiles.☆176May 29, 2021Updated 4 years ago
- Labs built in docker to cover NSE lessons☆11Nov 24, 2023Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆30Feb 6, 2023Updated 3 years ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago
- Directory/Subdomain scanner developed in GoLang.☆48Dec 5, 2020Updated 5 years ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆127Jan 10, 2023Updated 3 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆735Dec 13, 2023Updated 2 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- Awesome Vulnerable Applications☆1,368Jan 19, 2026Updated last month
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,676May 24, 2025Updated 9 months ago
- ☆37Apr 30, 2020Updated 5 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Exploit to dump ipmi hashes☆37Apr 21, 2023Updated 2 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Want to execute command repeatedly without workache? Here is shloop born for it!☆11Mar 2, 2022Updated 4 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆176Aug 17, 2023Updated 2 years ago
- Speed-up your hunting with google dorks🚀🚀☆21Sep 8, 2022Updated 3 years ago
- A curated GitHub repository that's in-scope and eligible for bounty.☆21Aug 10, 2022Updated 3 years ago
- Various Payload wordlists☆240Apr 26, 2025Updated 10 months ago
- Common Wordlists☆56Aug 26, 2016Updated 9 years ago
- ☆36Jul 11, 2018Updated 7 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Updated this week
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- A NoSQL Injectable Node App☆42Jun 8, 2021Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Jun 23, 2020Updated 5 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- ☆38Nov 27, 2020Updated 5 years ago
- Damn Vulnerable C# Application (API)☆79Jul 15, 2024Updated last year
- Kerberoast attack -pure python-☆433Nov 30, 2023Updated 2 years ago