Vulnerable app with examples showing how to not use secrets
☆1,395Updated this week
Alternatives and similar repositories for wrongsecrets
Users that are interested in wrongsecrets are comparing it to the libraries listed below
Sorting:
- Automating situational awareness for cloud penetration tests.☆2,295Updated this week
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,199Jul 14, 2024Updated last year
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,487Feb 12, 2026Updated 2 weeks ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆975Jan 12, 2024Updated 2 years ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,105Updated this week
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,416Nov 18, 2025Updated 3 months ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,173Nov 25, 2024Updated last year
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…