Checkmarx / GoatlinLinks
(aka Kotlin Goat) - an intentionally vulnerable Kotlin application
☆33Updated last year
Alternatives and similar repositories for Goatlin
Users that are interested in Goatlin are comparing it to the libraries listed below
Sorting:
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆248Updated 3 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆80Updated 3 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆296Updated last year
- Damn Vulnerable Java (EE) Application☆141Updated last year
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆172Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆185Updated last year
- The scripts helps security analsts to identify misconfigured firebase instances.☆219Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆128Updated 2 years ago
- Print out URL schemas from an Android app☆122Updated 7 months ago
- materials we hand out☆147Updated 2 months ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆181Updated 2 years ago
- AndroGoat☆273Updated 3 years ago
- ☆32Updated 2 years ago
- flask-webgoat is a deliberately-vulnerable application written with the Flask web framework.☆20Updated last week
- Checks if an Android application has successfully completed the "App Link Verification" process for Android App Links.☆61Updated last year
- The tool is used to analyze the content of the android application in local storage.☆164Updated 5 months ago
- GraphQL security testing tool☆124Updated 3 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆81Updated 2 years ago
- ☆124Updated last year
- ☆190Updated 2 years ago
- ☆199Updated 10 months ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆65Updated 4 years ago
- Covers Top 10 OWASP Mobile Vulnerabilities☆123Updated last year
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- ☆81Updated 3 years ago
- A starter secure code review checklist☆180Updated 6 years ago
- A Broken Application - Very Vulnerable!☆172Updated this week
- A Proof of Concept for demonstrating Task hijacking in Android using an attacker and a victim app.☆41Updated 4 years ago
- OWASP Code Review Guide Web Repository☆141Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year