CSPF-Founder / JavaSecurityCourseLinks
Hacking and Securing Java
☆76Updated 6 years ago
Alternatives and similar repositories for JavaSecurityCourse
Users that are interested in JavaSecurityCourse are comparing it to the libraries listed below
Sorting:
- Practice hacking JWT tokens☆116Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆77Updated 5 years ago
- Automatically modify the User-Agent header in all Burp requests☆58Updated 7 years ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆128Updated 2 years ago
- Workshop given at Hack in Paris 2019☆125Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- ☆84Updated last year
- Clone me and get your own authentic Parsia-Clone today.☆46Updated this week
- This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a p…☆111Updated last year
- ☆72Updated 5 years ago
- Damn Vulnerable Java (EE) Application☆142Updated last year
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- ☆60Updated 6 years ago
- Vulnerable Java based Web Application☆270Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆187Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆71Updated 5 years ago
- Tools, Resources & Helpful Tips☆14Updated 3 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆175Updated 11 months ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻☆127Updated 3 years ago
- Wordlist to bruteforce for LFI☆126Updated 6 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆110Updated 3 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Updated 5 years ago
- ☆11Updated 5 years ago
- ☆44Updated 3 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 3 years ago
- A XSS mind map ;)☆57Updated 9 years ago
- this repository is a docker containing some "XSS vulnerability" challenges and bypass examples.☆117Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆19Updated this week