ODA stands for Online DisAssembler. ODA is a general purpose machine code disassembler that supports a myriad of machine architectures. Bui...
[Comodo Instant Malware Analysis] Online Automated Analysis System
If you have a suspicious file, please submit it online by using the form below. Once the file is submitted, COMODO Automated Analysis Syste...
[BTS PenTesting Lab] A vulnerable web application to learn common vulnerabilities
The most common question from students who is learning website hacking techniques is "how to test my skills legally without getting i...
[Anubis] Online Analyzing Unknown Binaries
Anubis is a service for analyzing malware. Submit your Windows executable or Android APK and receive an analysis report telling you what ...
[VirusTotal] Online Malware Analysis Tool
VirusTotal, a subsidiary of Google, is a free online service that analyzes files and URLs enabling the identification of viruses,...
[SQL injection test environment] A collection of web pages vulnerable to SQL injection flaws
A collection of web pages vulnerable to SQL injection flaws and more: conf/ - operating system configuration files used by deployment.sh ...
[aidSQL] PHP Application For SQL Injection Detection & Exploitation
aidSQL a PHP application provided for detecting security holes in your website/s. It’s a modular application, meaning that you can develop ...
[Retire.js] Command line Scanner and Chrome plugin
Retire.js is a command line scanner that helps you identify dependencies with known vulnerabilites in your application. Using the provided G...
[Laudanum] Collection of injectable files
Laudanum is a collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple langu...
[Mellivora] Basic database driven CTF engine
Mellivora is a basic database driven CTF engine written in PHP. Requirements LAMP: PHP 5.3+, MySQL 5.5+, Apache 2.2+. May work with other ...
[ByteScanner] Check your file that dangerous or not
This website is web service for checking file that you're uploaded is the malicious file or not. It's similar Virustotal.com, try it...
[OWASP Broken Web Applications Project VM v1.1] Collection of vulnerable web applications
The Broken Web Applications (BWA) Project is a collection of vulnerable web applications that is distributed on a Virtual Machine. The Brok...
[SpiderFoot v2.0.4] Footprinting tool
SpiderFoot is a free, open-source footprinting tool, enabling you to perform various scans against a given domain name in order to obtain i...
[CookieCatcher] Session Hijacking Tool
CookieCatcher is an open source application which was created to assist in the exploitation of XSS (Cross Site Scripting) vulnerabilities ...
[MISP v2.1] Malware Information Sharing Platform
The problem that we experienced in the past was the difficulty to exchange information about (targeted) malwares and attacks within a group ...
[WATOBO 0.9.13] THE Web Application Toolbox
WATOBO is intended to enable security professionals to perform highly efficient (semi-automated) web application security audits. WATOBO w...
[RIPS] A static source code analyser for vulnerabilities in PHP scripts
RIPS is a tool written in PHP to find vulnerabilities in PHP applications using static code analysis. By tokenizing and parsing all source...
[WebVulScan] Web Application Vulnerability Scanner
WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used to test remote, or lo...
[OWASP Bricks] Modular Deliberately Vulnerable Web Application
Bricks is a deliberately vulnerable web application built on PHP and MySQL. The project focuses on variations of commonly seen applicat...
[ExploitSearch.net] Exploit / Vulnerability Search Engine
Exploitsearch.net , is an attempt at cross referencing/correlating exploits and vulnerability data from various sources and making the res...