CSPF-Founder / JavaSecurityCourseLinks
Hacking and Securing Java
☆78Updated 6 years ago
Alternatives and similar repositories for JavaSecurityCourse
Users that are interested in JavaSecurityCourse are comparing it to the libraries listed below
Sorting:
- Practice hacking JWT tokens☆116Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆78Updated 6 years ago
- Automatically modify the User-Agent header in all Burp requests☆61Updated 7 years ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆129Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆144Updated last year
- Workshop given at Hack in Paris 2019☆125Updated 2 years ago
- ☆87Updated last year
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- ☆60Updated 7 years ago
- Vulnerable Java based Web Application☆271Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- ☆26Updated 2 years ago
- Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQL…☆62Updated 8 years ago
- ☆72Updated 5 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆24Updated 2 weeks ago
- This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a p…☆112Updated last year
- A XSS mind map ;)☆57Updated 9 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Updated 5 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- A curated list of amazingly bug bounty tips from security researchers around the world.☆104Updated 6 years ago
- Clone me and get your own authentic Parsia-Clone today.☆46Updated this week
- A Web-UI for subdomain enumeration (subfinder)☆56Updated 5 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 3 years ago
- SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibil…☆154Updated 5 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- ☆51Updated 8 years ago
- ☆44Updated 2 years ago
- ☆51Updated 5 years ago