ScaleSec / vulnado
Purposely vulnerable Java application to help lead secure coding workshops
☆179Updated 9 months ago
Alternatives and similar repositories for vulnado:
Users that are interested in vulnado are comparing it to the libraries listed below
- Damn Vulnerable Java (EE) Application☆138Updated last year
- Damn Vulnerable Cloud Application☆192Updated 6 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆312Updated last year
- ☆188Updated 5 months ago
- Some good resources for getting started with application security☆142Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆103Updated 2 months ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆221Updated 2 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆123Updated 2 years ago
- Vulnerable Java based Web Application☆265Updated 9 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- All Things Bug Bounty☆114Updated 2 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆80Updated 2 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆151Updated 4 years ago
- ☆71Updated 4 years ago
- GraphQL security workshop labs☆104Updated 9 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆102Updated last year
- Repo for all the SKF Docker lab examples☆446Updated 8 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 3 months ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆189Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆350Updated 4 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 10 months ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆125Updated 2 years ago
- Damn Vulnerable C# Application (API)☆73Updated 9 months ago
- materials we hand out☆142Updated 2 weeks ago
- ☆124Updated last year
- Awesome information for WebSockets security research☆267Updated 3 years ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆130Updated 4 years ago
- ☆80Updated 3 years ago
- Damn Vulnerable Python Web App☆168Updated 10 months ago