ahm3dhany / Broken-Web-ApplicationLinks
An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.
☆11Updated last year
Alternatives and similar repositories for Broken-Web-Application
Users that are interested in Broken-Web-Application are comparing it to the libraries listed below
Sorting:
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- Damn Vulnerable Node Application☆20Updated 9 years ago
- Scripts for Deploying new server☆49Updated 5 months ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Various tools for managing bug bounty recon and exploration.☆48Updated 2 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Updated 6 years ago
- Actarus is a custom tool for bug bounty☆77Updated 5 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- ☆42Updated 7 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Updated 9 years ago
- Learning Penetration Testing of Android Applications☆79Updated 8 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- ☆18Updated 8 years ago
- ☆22Updated 8 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 8 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆20Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆64Updated 9 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 9 years ago
- ☆34Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 6 years ago
- PHP tool to test XSS☆22Updated 5 years ago