CSPF-Founder / JavaSecurityCourse
Hacking and Securing Java
☆72Updated 5 years ago
Related projects: ⓘ
- Practice hacking JWT tokens☆111Updated 2 years ago
- Vulnerable Java based Web Application☆255Updated 3 months ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆119Updated last year
- Damn Vulnerable Java (EE) Application☆129Updated 7 months ago
- Static code analysis tool based on Elasticsearch☆129Updated 3 years ago
- This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a p…☆96Updated 5 months ago
- List of Awesome Red Teaming Resources☆43Updated 6 years ago
- This is a burp intruder extender that is designed for automation and validation of XSS vulnerabilities.☆82Updated 2 years ago
- ☆78Updated 4 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆164Updated 2 months ago
- J2EEScan is a plugin for Burp Suite Proxy. The goal of this plugin is to improve the test coverage during web application penetration tes…☆72Updated 3 years ago
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆103Updated 4 years ago
- Log4j JNDI inj. vuln scanner☆64Updated 2 years ago
- A Web-UI for subdomain enumeration (subfinder)☆53Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆41Updated 7 months ago
- ☆71Updated 4 years ago
- Automatically modify the User-Agent header in all Burp requests☆52Updated 6 years ago
- JWT Support for Burp☆106Updated 3 weeks ago
- LFI Payloads List coolected from github repos☆70Updated 4 years ago
- ☆53Updated this week
- ☆70Updated 7 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆74Updated 2 years ago
- API Pentesting notes.☆96Updated 2 years ago
- ☆60Updated 5 years ago
- Burp Bounty profiles☆82Updated 2 years ago
- This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.☆74Updated 3 years ago
- PenTest Methodology☆11Updated last year
- ☆72Updated 4 months ago
- Preparation for OSWE☆39Updated 4 years ago
- All Things Bug Bounty☆110Updated 2 years ago