A Broken Application - Very Vulnerable!
☆183Mar 4, 2026Updated this week
Alternatives and similar repositories for brokencrystals
Users that are interested in brokencrystals are comparing it to the libraries listed below
Sorting:
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Mar 25, 2024Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42May 9, 2020Updated 5 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆502Feb 28, 2026Updated last week
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,174Nov 25, 2024Updated last year
- Web Application Firewall (WAF) Detector☆35Mar 13, 2023Updated 2 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆133Dec 22, 2022Updated 3 years ago
- a Damn Vulnerable Serverless Application☆542Sep 12, 2023Updated 2 years ago
- A NoSQL Injectable Node App☆42Jun 8, 2021Updated 4 years ago
- ☆84May 1, 2023Updated 2 years ago
- A lab to play with authentication and authorisation problems☆98Mar 7, 2023Updated 3 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,329Jan 10, 2025Updated last year
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆735Dec 13, 2023Updated 2 years ago
- Vulnerable Banking Suite☆169Sep 29, 2025Updated 5 months ago
- ☆25Jul 7, 2023Updated 2 years ago
- Network security exercises in a SDN made from handcrafted packets☆27Nov 11, 2016Updated 9 years ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- A simple web app with a XXE vulnerability.☆232Nov 10, 2021Updated 4 years ago
- Portfolio website of Yinka Adedire, Frontend Developer. Built with GatsbyJS.☆11Nov 4, 2022Updated 3 years ago
- Web Application Firewall (WAF) Enhanced with AI through Autonomous Dynamic Learning and Generative Models☆16Feb 25, 2026Updated last week
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Sep 2, 2022Updated 3 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,490Feb 12, 2026Updated 3 weeks ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- EPUB media server written in Crystal☆10Dec 7, 2022Updated 3 years ago
- Welcome to the secure code review snippets for secure code review snippets! This repository aims to provide developers with valuable exam…☆14Feb 19, 2025Updated last year
- A curated list of vulnerable web applications.☆336Dec 30, 2023Updated 2 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- ☆14Aug 19, 2023Updated 2 years ago
- Short deep dive into Threat Hunting on AWS☆17Oct 15, 2023Updated 2 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆16Jan 8, 2019Updated 7 years ago
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 3 years ago
- The official TrueLayer .NET library provides convenient access to TrueLayer APIs from applications built with .NET.☆15Feb 2, 2026Updated last month
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆43Jan 15, 2026Updated last month
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 9 months ago
- Ruby command-line interface to Burp Suite's REST API☆58Apr 1, 2020Updated 5 years ago