ScaleSec / vulnado
Purposely vulnerable Java application to help lead secure coding workshops
☆169Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for vulnado
- Damn Vulnerable Java (EE) Application☆130Updated 9 months ago
- ☆175Updated 2 weeks ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆306Updated 7 months ago
- Damn Vulnerable Cloud Application☆187Updated 6 years ago
- Some good resources for getting started with application security☆135Updated 3 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆168Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆98Updated 11 months ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆112Updated last year
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆76Updated 2 years ago
- All Things Bug Bounty☆110Updated 2 years ago
- ☆393Updated 3 years ago
- GraphQL security workshop labs☆102Updated 4 months ago
- A simple web app with a XXE vulnerability.☆225Updated 3 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆151Updated 4 years ago
- ☆121Updated 3 years ago
- Repo for all the OWASP-SKF Docker lab examples☆440Updated 3 months ago
- Workshop given at Hack in Paris 2019☆121Updated last year
- ☆75Updated 2 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆84Updated last month
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆252Updated 2 years ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆124Updated 4 years ago
- Unofficial documentation for the great tool Param Miner☆173Updated 2 years ago
- A starter secure code review checklist☆178Updated 5 years ago
- ActiveScan++ Burp Suite Plugin☆208Updated 11 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆133Updated 4 years ago
- materials we hand out☆138Updated last month
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆61Updated 5 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆98Updated 9 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆278Updated 2 years ago
- A Broken Application - Very Vulnerable!☆131Updated last week