vianasw / dvwpsView external linksLinks
Damn Vulnerable WordPress Site
☆51Feb 24, 2023Updated 2 years ago
Alternatives and similar repositories for dvwps
Users that are interested in dvwps are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Java (EE) Application☆144Jan 23, 2024Updated 2 years ago
- Damn Vulnerable Python Web App☆183May 21, 2024Updated last year
- Damn Vulnerable Thick Client App developed in C# .NET☆174Aug 17, 2023Updated 2 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- Damn Vulnerable NodeJS Application☆757Mar 27, 2024Updated last year
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆457Dec 6, 2021Updated 4 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Jan 26, 2026Updated 2 weeks ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30May 6, 2020Updated 5 years ago
- Damn Vulnerable WordPress☆197Dec 23, 2023Updated 2 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- An intentionally designed broken web application based on REST API.☆577Jun 10, 2021Updated 4 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 4 years ago
- Ransomware programado en Python☆10Oct 8, 2020Updated 5 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- ☆28Jun 27, 2020Updated 5 years ago
- Tiny read-only unlocker for MS Office documents☆12Aug 18, 2021Updated 4 years ago
- Numbers in Your Documents can reveal your personal informations. This tool is an OSINT tool to gather informations from CC, BIN code, MIC…☆13Jan 31, 2021Updated 5 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- ☆12Jan 9, 2023Updated 3 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Spongebob-themed cypher injection playground☆13Jun 4, 2023Updated 2 years ago
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 9 months ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Jan 28, 2026Updated 2 weeks ago
- ☆16May 3, 2021Updated 4 years ago
- This is a python program backdoor embeded with a game for reverse connection from the victim to understand the use visit our youtube chan…☆11Dec 20, 2021Updated 4 years ago
- 1secmail disposable temp mail service from terminal☆12Dec 5, 2022Updated 3 years ago
- 🛠️ Simple EXE-File Pumper, written in C#☆17Nov 7, 2020Updated 5 years ago
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- Git-lfs RCE exploit CVE-2020-27955 - tested on Windows on: git, gh cli, GitHub Desktop, Visual Studio, SourceTree etc.☆30Jan 12, 2021Updated 5 years ago
- ☆14Jul 18, 2023Updated 2 years ago
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆68Oct 15, 2019Updated 6 years ago
- Quack Toolkit is a set of a denial of service attack methods. Quack includes SMS attack method, HTTP attack method and many other attack …☆16Feb 12, 2020Updated 6 years ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,167Nov 25, 2024Updated last year
- Uses viewdns.info to perform a reverse NS lookup on a specified nameserver and attempts zone transfers on discovered domains☆19May 2, 2019Updated 6 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Dec 15, 2025Updated last month