OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security enthusiasts.
☆102Jul 2, 2025Updated 8 months ago
Alternatives and similar repositories for mutillidae-docker
Users that are interested in mutillidae-docker are comparing it to the libraries listed below
Sorting:
- OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is…☆1,468Aug 3, 2025Updated 7 months ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Jun 19, 2024Updated last year
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- A tool to discover domains using crt.sh site (certificate transparency logs).☆15Aug 1, 2019Updated 6 years ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year
- TLDRBins is a repo for cybersecurity researchers to quick search for commands.☆31Nov 10, 2025Updated 3 months ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Updated this week
- ☆54Jun 1, 2024Updated last year
- Collect XSS vulnerable parameters from entire domain.☆155Jul 29, 2022Updated 3 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated last month
- My talks...☆25Feb 27, 2025Updated last year
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 2 years ago
- Minified version of Project Sherlock written in GO. Lookup given username from 1000 social networks☆31Oct 19, 2023Updated 2 years ago
- 一键下载器,可从任何网页下载图片和视频,并增强对微信公众号文章的支持(One-click downloader for images and videos from any webpage, with enhanced support for WeChat Official…☆72Updated this week
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆14Jan 11, 2023Updated 3 years ago
- Damn Vulnerable WordPress☆198Dec 23, 2023Updated 2 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- offensive security scripts and documentation☆30Dec 9, 2025Updated 2 months ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36May 14, 2022Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Based on Recursive Backtracker algo☆11Oct 25, 2020Updated 5 years ago
- Burp request/response timer☆36Nov 8, 2017Updated 8 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 2 years ago
- 本项目是一个以“实战为导向”的 XSS 漏洞练习靶场,覆盖反射型、存储型、DOM 型、SVG、CSP、框架注入、协议绕过等多种场景。页面样式统一,逻辑清晰,适合系统化学习与教学演示☆21Jan 10, 2026Updated last month
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- OWASP Broken Web Applications Project☆310Mar 13, 2024Updated last year
- A simple web app with a XXE vulnerability.☆231Nov 10, 2021Updated 4 years ago
- Host Header Injection Checker☆84Mar 2, 2022Updated 4 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆472Oct 23, 2022Updated 3 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago