Contrast-Security-OSS / vulnerable-spring-boot-application
☆14Updated last year
Alternatives and similar repositories for vulnerable-spring-boot-application:
Users that are interested in vulnerable-spring-boot-application are comparing it to the libraries listed below
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- A framework for automating penetration testing using a plugin based architecture☆38Updated 2 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- ☆13Updated 2 years ago
- ☆38Updated 4 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- Python Package for burprestapi☆16Updated 5 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Updated last year
- Open Security Summit 2018☆29Updated 4 years ago
- Utilities for creating Burp Suite Extensions.☆21Updated 6 months ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆12Updated 5 years ago
- ☆24Updated last year
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 11 months ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Vulnerable Java based Web Application☆31Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago