Contrast-Security-OSS / vulnerable-spring-boot-application
☆14Updated last year
Alternatives and similar repositories for vulnerable-spring-boot-application:
Users that are interested in vulnerable-spring-boot-application are comparing it to the libraries listed below
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- Utilities for creating Burp Suite Extensions.☆21Updated 5 months ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- Burp extension to passively scan for applications revealing software version numbers☆31Updated 10 months ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- ☆13Updated 2 years ago
- Burp Suite extension to passively scan for applications revealing server error messages☆66Updated last year
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- ☆38Updated 4 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆32Updated 6 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Serverless Workshop☆16Updated 2 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 7 years ago
- Viewstate Hidden Control Enumerator☆17Updated 11 years ago
- Scans tcl for command injection☆36Updated 5 years ago
- ☆23Updated last year
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆12Updated 5 years ago
- CSRF Scanner Extension for Burp Suite Pro☆20Updated 6 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆19Updated 3 years ago