ScaleSec / vulnado
Purposely vulnerable Java application to help lead secure coding workshops
☆179Updated 10 months ago
Alternatives and similar repositories for vulnado:
Users that are interested in vulnado are comparing it to the libraries listed below
- Damn Vulnerable Java (EE) Application☆138Updated last year
- Some good resources for getting started with application security☆142Updated 3 years ago
- Damn Vulnerable Cloud Application☆193Updated 6 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆125Updated 2 years ago
- ☆189Updated 6 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆316Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆104Updated 3 months ago
- ☆71Updated 4 years ago
- Awesome resources about Security in Kubernetes☆42Updated 2 years ago
- GraphQL security workshop labs☆108Updated this week
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆221Updated 2 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆79Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- Vulnerable Python Application To Learn Secure Development☆104Updated 11 months ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆189Updated 3 years ago
- Vulnerable Java based Web Application☆267Updated 10 months ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆156Updated 8 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- All Things Bug Bounty☆114Updated 2 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 10 months ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- oauth security guidelines☆223Updated 5 years ago
- A starter secure code review checklist☆182Updated 6 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- ☆123Updated last year
- materials we hand out☆143Updated last month
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- ☆78Updated 2 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated 7 months ago