NeuraLegion / brokencrystals
A Broken Application - Very Vulnerable!
☆131Updated last week
Related projects ⓘ
Alternatives and complementary repositories for brokencrystals
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆112Updated last year
- ☆71Updated last year
- Security Auditor Utility for GraphQL APIs☆383Updated 2 months ago
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆185Updated 3 months ago
- GraphQL security workshop labs☆102Updated 4 months ago
- Damn Vulnerable Java (EE) Application☆130Updated 9 months ago
- This repo contains the code for my secure code review challenges☆69Updated last month
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆329Updated last year
- ☆181Updated last year
- xss development frameworks, with the goal of making payload writing easier.☆136Updated 3 months ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆76Updated 2 years ago
- ☆146Updated last year
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆181Updated 2 years ago
- Vulnerability Scan with Nuclei☆242Updated this week
- GraphQL security testing tool☆117Updated 2 years ago
- OWASP Foundation Web Respository☆37Updated 2 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆169Updated 4 months ago
- Awesome information for WebSockets security research☆252Updated 2 years ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆134Updated 2 weeks ago
- Some good resources for getting started with application security☆135Updated 3 years ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆390Updated last week
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆228Updated last year
- Websec interview questions by tib3rius answered☆303Updated last year
- GQLSpection - parses GraphQL introspection schema and generates possible queries☆71Updated 4 months ago
- Automation of tokens/api keys testing.☆115Updated last year
- Damn Vulnerable C# Application (API)☆71Updated 4 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆98Updated 9 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆84Updated last month
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆306Updated 7 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆61Updated 5 months ago