ScaleSec / vulnadoLinks
Purposely vulnerable Java application to help lead secure coding workshops
☆187Updated last year
Alternatives and similar repositories for vulnado
Users that are interested in vulnado are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Java (EE) Application☆142Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- oauth security guidelines☆227Updated 6 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Updated 2 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆80Updated 3 years ago
- Damn Vulnerable Cloud Application☆199Updated 7 years ago
- Some good resources for getting started with application security☆143Updated 4 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆182Updated 2 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 3 years ago
- ☆202Updated 11 months ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Damn Vulnerable Python Web App☆180Updated last year
- A starter secure code review checklist☆182Updated 6 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆253Updated last month
- ☆81Updated 3 years ago
- OWASP Code Review Guide Web Repository☆144Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- A step by step workshop to exploit various vulnerabilities in Node.js and Java applications☆157Updated last year
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆188Updated 3 years ago
- Repo for all the SKF Docker lab examples☆458Updated last year
- ☆72Updated 5 years ago
- OWASP Foundation Web Respository☆37Updated 3 weeks ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- materials we hand out☆147Updated 3 months ago
- flask-webgoat is a deliberately-vulnerable application written with the Flask web framework.☆20Updated last month
- vulnerable single sign on☆148Updated last year
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆136Updated 5 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- Vulnerable Python Application To Learn Secure Development☆121Updated last year
- ☆192Updated 2 years ago