HCL-TECH-SOFTWARE / AltoroJView external linksLinks
WARNING: This app contains security vulnerabilities. AltoroJ is a sample banking J2EE web application. It shows what happens when web applications are written with consideration of app functionality but not app security. It's a simple and uncluttered platform for demonstrating and learning more about real-life application security issues.
☆282Jul 23, 2024Updated last year
Alternatives and similar repositories for AltoroJ
Users that are interested in AltoroJ are comparing it to the libraries listed below
Sorting:
- Maven plugin for integrating with HCL AppScan Source☆10Sep 4, 2025Updated 5 months ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- A deliberately vulnerable java app for educational purposes☆19Mar 4, 2024Updated last year
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- W3C Standards Vulnerability Disclosure & Handling Process and Policy☆25Jan 14, 2026Updated 3 weeks ago
- A modern vulnerable web app☆1,016Mar 11, 2021Updated 4 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 3 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Random HTTP User-Agent string generator☆11Oct 22, 2014Updated 11 years ago
- thinkphp5 RCE auto exploit☆11Jun 19, 2019Updated 6 years ago
- ☆11May 15, 2020Updated 5 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- Strengthen your defense against web attacks with Kali Linux and Metasploit☆13Jan 30, 2023Updated 3 years ago
- POC in order to materialize CSRF prevention concepts described in the following OWASP CSRF cheatsheet☆30May 25, 2017Updated 8 years ago
- Random Exploits☆50Sep 12, 2023Updated 2 years ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- Interstellar Assets.☆10Nov 26, 2024Updated last year
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Nov 22, 2022Updated 3 years ago
- Official repository of the Blackbuntu pentesting distribution☆12Feb 5, 2023Updated 3 years ago
- 📒 Quick script to generate a table of contents from a markdown document☆15Apr 15, 2023Updated 2 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Apr 7, 2023Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 6 months ago
- All the cheatsheets a man could ever need☆32Mar 7, 2021Updated 4 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆883Dec 15, 2025Updated last month
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Sep 22, 2021Updated 4 years ago
- Root-me Hall Of Fame dashboard☆14Mar 30, 2023Updated 2 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 5 years ago
- A collection of katas to help practice your DevOps techniques☆14May 15, 2015Updated 10 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- ☆84May 1, 2023Updated 2 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆33Aug 26, 2022Updated 3 years ago
- OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is…☆1,468Aug 3, 2025Updated 6 months ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆99Sep 9, 2023Updated 2 years ago