Vulnerable Java based Web Application
☆34Jun 24, 2019Updated 6 years ago
Alternatives and similar repositories for VulnerableSpring
Users that are interested in VulnerableSpring are comparing it to the libraries listed below
Sorting:
- Hacking and Securing Java☆79Jan 24, 2019Updated 7 years ago
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Repository to showcase various configuration recipes with various technologies☆36Dec 16, 2022Updated 3 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15May 17, 2025Updated 9 months ago
- ☆42Jul 16, 2018Updated 7 years ago
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- A vulnerable Play application for attackers.☆18Feb 16, 2026Updated last week
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- ☆23Apr 8, 2015Updated 10 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vul…☆50Feb 19, 2026Updated last week
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- ☆18Nov 6, 2016Updated 9 years ago
- Testing tools for Oracle Forms☆45May 27, 2023Updated 2 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Mar 26, 2015Updated 10 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- ☆49Jul 25, 2017Updated 8 years ago
- A dumb script for finding dumb coding errors in WordPress plugins☆53Jun 15, 2022Updated 3 years ago
- Damn Vulnerable Python Web App☆185May 21, 2024Updated last year
- Duncan - Blind SQL injector skeleton☆60Jan 11, 2022Updated 4 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Vulnerable Python Application To Learn Secure Development☆127May 31, 2024Updated last year
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- 一款存储HTTP请求入库的burpsuite插件☆29Apr 8, 2018Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Apr 30, 2016Updated 9 years ago
- Collection of tools for privesc on Linux☆34Aug 28, 2013Updated 12 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Perform timing attacks against web applications☆126Oct 13, 2019Updated 6 years ago
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- DragonJAR Automatic Windows Forensic☆13May 23, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Sep 6, 2014Updated 11 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago