ScaleSec / vulnadoLinks
Purposely vulnerable Java application to help lead secure coding workshops
☆191Updated last year
Alternatives and similar repositories for vulnado
Users that are interested in vulnado are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Java (EE) Application☆144Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆134Updated 2 years ago
- Damn Vulnerable Cloud Application☆200Updated 7 years ago
- ☆205Updated 2 weeks ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- Some good resources for getting started with application security☆141Updated 4 years ago
- A starter secure code review checklist☆183Updated 7 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 10 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆182Updated 3 years ago
- oauth security guidelines☆228Updated 6 years ago
- OWASP Foundation Web Respository☆37Updated 2 months ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 3 years ago
- ☆82Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Damn Vulnerable Python Web App☆182Updated last year
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆188Updated 4 years ago
- OWASP Code Review Guide Web Repository☆146Updated 3 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 5 years ago
- materials we hand out☆148Updated 4 months ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆137Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆107Updated last year
- ☆72Updated 5 years ago
- A step by step workshop to exploit various vulnerabilities in Node.js and Java applications☆157Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Updated last year
- Workshop given at Hack in Paris 2019☆125Updated 2 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- ☆124Updated 2 years ago