CSPF-Founder / JavaSecurityCourse
Hacking and Securing Java
☆74Updated 5 years ago
Alternatives and similar repositories for JavaSecurityCourse:
Users that are interested in JavaSecurityCourse are comparing it to the libraries listed below
- Vulnerable Java based Web Application☆260Updated 7 months ago
- Damn Vulnerable Java (EE) Application☆132Updated 11 months ago
- Practice hacking JWT tokens☆112Updated 2 years ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆122Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆74Updated 5 years ago
- ☆78Updated 8 months ago
- LFI Payloads List coolected from github repos☆72Updated 4 years ago
- ☆60Updated 6 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆78Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆169Updated 2 months ago
- Automatically modify the User-Agent header in all Burp requests☆53Updated 7 years ago
- List of Awesome Red Teaming Resources☆44Updated 7 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Updated 7 years ago
- A Web-UI for subdomain enumeration (subfinder)☆54Updated 4 years ago
- ☆42Updated 2 years ago
- ☆74Updated 8 months ago
- ☆71Updated 4 years ago
- Workshop given at Hack in Paris 2019☆121Updated last year
- Burp Bounty profiles☆82Updated 3 years ago
- Vulnerable Java based Web Application☆31Updated 5 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆42Updated 2 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Updated last year
- ☆125Updated 3 years ago
- Wordlist to bruteforce for LFI☆118Updated 5 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆106Updated 5 years ago
- Preparation for OSWE☆40Updated 4 years ago