Secure-D / wastcLinks
Secure-D Web Application Security Test Checklist summarizes well-known weaknesses, vulnerabilities and best practices into review topics with short description and recommendation. Its objective is to aid penetration tester to review the web application thoroughly.
☆21Updated 4 years ago
Alternatives and similar repositories for wastc
Users that are interested in wastc are comparing it to the libraries listed below
Sorting:
- WaTF Bank - What a Terrible Failure Mobile Banking Application for Android and iOS☆138Updated 3 years ago
- The domain enumeration and scanning tool for hackers☆18Updated 11 months ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆74Updated 6 years ago
- ROP Wargame repository☆26Updated 7 years ago
- Examples demonstrating some common web application vulnerabilities.☆42Updated 9 years ago
- ☆13Updated last month
- HackToday is annual ctf competition held by Cyber Security IPB☆17Updated 4 years ago
- My writeups of various CTFs & security challenges☆73Updated this week
- KPMG Cyber Security Challenge 2017 questions repository and writeups☆18Updated 6 years ago
- An insecure example application (Java)☆33Updated 2 weeks ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated last year
- Geospatial analysis and simulation using Twitter data☆22Updated 7 years ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 9 years ago
- คลังข้อมูลวิธีการเอาตัวรอดด้วยอุปกรณ์ดิจิตอล☆49Updated 3 years ago
- COVID19 Library☆13Updated 5 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆85Updated 5 years ago
- An android application which exploits sieve through android components.☆44Updated 7 years ago
- Vulnerable webapp testbed☆22Updated 9 years ago
- Capture The Flag | Cyber SEA GAME 2019 | Writeup☆12Updated 5 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆106Updated 2 years ago
- Several Python scripts used to fuzz and exploit SLmail. These are meant to supplement the Kali Linux Hands-on Pentesting Udemy course.☆16Updated 6 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Updated 6 years ago
- ติดตั้ง Kubernetes ในแนวทาง Kubernetes The Hard Way☆195Updated 3 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Updated 7 years ago
- ☆58Updated 7 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆86Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆141Updated last year
- Burp Suite Professional in a Docker container.☆83Updated 3 weeks ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆43Updated last year