OWASP / Vulnerable-Web-ApplicationLinks
OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyber
☆387Updated last year
Alternatives and similar repositories for Vulnerable-Web-Application
Users that are interested in Vulnerable-Web-Application are comparing it to the libraries listed below
Sorting:
- A curated list of vulnerable web applications.☆313Updated last year
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆518Updated last week
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆880Updated last week
- Some good resources for getting started with application security☆142Updated 4 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆459Updated 2 years ago
- Repo for all the SKF Docker lab examples☆455Updated last year
- A collection of templates for bug bounty reporting☆417Updated 4 months ago
- 🎯 Open Redirect Payload List☆611Updated last year
- Awesome Writeups and POCs☆548Updated 7 months ago
- Fast and easy script to manage pentesting training apps☆369Updated last year
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆673Updated 5 years ago
- ☆335Updated 5 years ago
- An organized list of resources including tools, blog-posts and how-to tutorials compiled and created by SCSP community members.☆440Updated 3 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆469Updated 2 years ago
- The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)☆459Updated 2 years ago
- ☆434Updated 2 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆247Updated 2 months ago
- University lecture on "IT Security" as Open Educational Resources material☆377Updated 2 years ago
- this html file creates a csrf poc form to any http request.☆280Updated 2 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆488Updated 11 months ago
- RepoToStoreBugBountyInfo☆343Updated 5 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆321Updated last year
- Vulnerable API☆412Updated 2 years ago
- 🎯 RFI/LFI Payload List☆614Updated last year
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,174Updated 3 months ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,320Updated 4 years ago
- Web Security Checklist (Bug Bounty & Pentesting)☆170Updated 3 months ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆152Updated 7 years ago
- Bugcrowd’s baseline priority ratings for common security vulnerabilities☆492Updated 3 weeks ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆451Updated 5 years ago