NeuraLegion / brokencrystalsView external linksLinks
A Broken Application - Very Vulnerable!
☆183Updated this week
Alternatives and similar repositories for brokencrystals
Users that are interested in brokencrystals are comparing it to the libraries listed below
Sorting:
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Mar 25, 2024Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- A vulnerable Application in crystal☆20Dec 12, 2020Updated 5 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42May 9, 2020Updated 5 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Jan 26, 2026Updated 2 weeks ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,167Nov 25, 2024Updated last year
- Web Application Firewall (WAF) Detector☆35Mar 13, 2023Updated 2 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Dec 22, 2022Updated 3 years ago
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆32Mar 4, 2025Updated 11 months ago
- a Damn Vulnerable Serverless Application☆544Sep 12, 2023Updated 2 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- A NoSQL Injectable Node App☆42Jun 8, 2021Updated 4 years ago
- Web Application Firewall (WAF) Enhanced with AI through Autonomous Dynamic Learning and Generative Models☆14Nov 21, 2024Updated last year
- ☆84May 1, 2023Updated 2 years ago
- A lab to play with authentication and authorisation problems☆98Mar 7, 2023Updated 2 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,324Jan 10, 2025Updated last year
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆731Dec 13, 2023Updated 2 years ago
- Vulnerable Banking Suite☆168Sep 29, 2025Updated 4 months ago
- ☆25Jul 7, 2023Updated 2 years ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 8 months ago
- A simple web app with a XXE vulnerability.☆230Nov 10, 2021Updated 4 years ago
- My talks...☆25Feb 27, 2025Updated 11 months ago
- Portfolio website of Yinka Adedire, Frontend Developer. Built with GatsbyJS.☆11Nov 4, 2022Updated 3 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆46Sep 2, 2022Updated 3 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆883Dec 15, 2025Updated 2 months ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆15Jan 8, 2019Updated 7 years ago
- Welcome to the secure code review snippets for secure code review snippets! This repository aims to provide developers with valuable exam…☆14Feb 19, 2025Updated 11 months ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- A curated list of vulnerable web applications.☆336Dec 30, 2023Updated 2 years ago
- A security professional's swiss army knife for interacting with raw serial devices☆30Apr 20, 2024Updated last year
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 2 years ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆42Jan 15, 2026Updated last month
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Short deep dive into Threat Hunting on AWS☆17Oct 15, 2023Updated 2 years ago
- ☆14Aug 19, 2023Updated 2 years ago