ScaleSec / vulnadoLinks
Purposely vulnerable Java application to help lead secure coding workshops
☆191Updated last year
Alternatives and similar repositories for vulnado
Users that are interested in vulnado are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Java (EE) Application☆144Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆134Updated 3 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- A starter secure code review checklist☆184Updated 7 years ago
- Damn Vulnerable Cloud Application☆201Updated 7 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Damn Vulnerable Python Web App☆183Updated last year
- A tool geared towards pentesting APIs using OpenAPI definitions.☆182Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 3 years ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- ☆215Updated last week
- oauth security guidelines☆228Updated 6 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 11 months ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆188Updated 4 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆82Updated 2 years ago
- ☆85Updated 3 years ago
- GraphQL security workshop labs☆116Updated 3 weeks ago
- materials we hand out☆147Updated 5 months ago
- OWASP Code Review Guide Web Repository☆146Updated 3 years ago
- Workshop given at Hack in Paris 2019☆125Updated 2 years ago
- Repo for all the SKF Docker lab examples☆461Updated last year
- ☆194Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆110Updated 2 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆359Updated 5 years ago
- A step by step workshop to exploit various vulnerabilities in Node.js and Java applications☆157Updated last year
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆136Updated 5 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 5 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆78Updated 6 years ago