OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security enthusiasts.
☆103Jul 2, 2025Updated 9 months ago
Alternatives and similar repositories for mutillidae-docker
Users that are interested in mutillidae-docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security enthusiasts.☆31Nov 25, 2024Updated last year
- Sampling of simple cipher systems to aid in understanding☆14Jan 25, 2018Updated 8 years ago
- سناب شات سكرابر تتيح لك تحميل القصص العامة من سناب شات مع الصور والفيديوهات، وتعرض التواريخ الزمنية لكل قصة. تركز على الخصوصية ولا تصل لل…☆15Apr 1, 2025Updated last year
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Jun 19, 2024Updated last year
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to discover domains using crt.sh site (certificate transparency logs).☆15Aug 1, 2019Updated 6 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 5 years ago
- A cross-platform tool to work with Security Identifiers (SID) formats.☆16Jun 21, 2025Updated 9 months ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- My talks...☆25Feb 27, 2025Updated last year
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 6 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆36Oct 31, 2023Updated 2 years ago
- ☆54Jun 1, 2024Updated last year
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Minified version of Project Sherlock written in GO. Lookup given username from 1000 social networks☆32Oct 19, 2023Updated 2 years ago
- 基于领英的企业用户名收集☆13Feb 3, 2020Updated 6 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- Collect XSS vulnerable parameters from entire domain.☆155Jul 29, 2022Updated 3 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- OWASP Foundation Web Respository☆12May 3, 2023Updated 2 years ago
- For pentesters who don't wanna leave their terminals.☆183Aug 27, 2021Updated 4 years ago
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Pentest report writing guide☆19Sep 24, 2023Updated 2 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated 3 months ago
- Simple C# Port Scanner (Multi-Threaded)☆51Jan 23, 2021Updated 5 years ago
- ☆16May 17, 2024Updated last year
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- My Writeups and Walkthroughs☆64Jul 14, 2025Updated 9 months ago
- 🔍 Improve your files enumeration with specific extensions!☆17Jan 11, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- FortiAnalyzer mimick using an ELK stack☆10Aug 3, 2020Updated 5 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 4 years ago
- Will share some interesting writeups here :)☆18Oct 18, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Jun 25, 2022Updated 3 years ago