RasPwn
Training OS
An intentionally vulnerable operating system designed as a training tool for penetration testing and hacking
RasPwn OS
55 stars
8 watching
4 forks
Language: Shell
last commit: over 7 years ago Related projects:
Repository | Description | Stars |
---|---|---|
aau-network-security/haaukins | A platform providing automated virtualization environments for security education and vulnerability testing | 188 |
yyzpiero/rl4redteam | An agent trained to scan for vulnerabilities and exploit them in a simulated network environment | 23 |
kapejod/rtpnatscan | A command line tool to scan RTP proxies for vulnerabilities to NAT stealing attacks | 24 |
misp/misp-training | Training materials and source code for threat intelligence, information sharing, and MISP software development. | 391 |
m507/awae-preparation | A collection of training materials and tutorials to prepare for advanced web application penetration testing certifications | 236 |
blackout314/whereismypi | Tools to identify devices on a local network. | 3 |
bkerler/exploit_me | An educational platform showcasing 14 different types of vulnerabilities in ARM/AARCH64 applications through CTF-style exploitation tutorials. | 897 |
1n3/blackwidow | A Python-based web application scanner that gathers OSINT and fuzz data to identify OWASP vulnerabilities on target websites. | 1,545 |
spencerdodd/kernelpop | Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. | 687 |
osirislab/hack-night | A structured training session covering offensive security topics and culminating in a practical research project. | 1,234 |
hackthelegacy/hack400tool | A set of tools for gathering information and exploiting vulnerabilities in IBM Power Systems | 97 |
davevs/dvxte | A containerized training environment with multiple vulnerable applications and tools to test security skills | 102 |
eth-sri/diffai | Trains neural networks to be provably robust against adversarial examples using abstract interpretation techniques. | 219 |
0xsauby/yasuo | Scans for vulnerable 3rd-party web applications on a network | 570 |