An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.
☆11Aug 1, 2024Updated last year
Alternatives and similar repositories for Broken-Web-Application
Users that are interested in Broken-Web-Application are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple customer and order management system written especially with photographers in mind☆13Nov 19, 2018Updated 7 years ago
- cve-2017-5638 Vulnerable site sample☆14Apr 4, 2017Updated 9 years ago
- small webhosting management portal☆16Updated this week
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆29Jan 22, 2016Updated 10 years ago
- Projeto voltado ao desenvolvimento de uma aplicação web intencionalmente vulnerável.☆11Feb 25, 2023Updated 3 years ago
- MessageBox files (EXE, DLL) for testing purposes.☆13Mar 9, 2019Updated 7 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- 23–24 мая 2020 ⋅ Юниорские соревнования по информационной безопасности☆10Jun 14, 2020Updated 5 years ago
- ☆15Aug 25, 2023Updated 2 years ago
- An intentionally-vulnerable web application, ported from https://github.com/jzheaux/terracotta-bank-spring☆42Jan 23, 2023Updated 3 years ago
- Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX☆19Jul 22, 2023Updated 2 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A deliberately vulnerable js app made with reactjs. For educational purposes.☆17Mar 20, 2019Updated 7 years ago
- NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a bet…☆19Nov 21, 2022Updated 3 years ago
- Web Based (novnc) Ubuntu Linux Desktop (Mate) for Kubernetes☆15May 1, 2023Updated 3 years ago
- Go con Ejemplos☆17Apr 6, 2021Updated 5 years ago
- ☆13Jun 7, 2021Updated 4 years ago
- Материалы летней школы Surf по iOS разработке☆11Jul 27, 2018Updated 7 years ago
- Android SSL certificate validation vulnerability detection tools.☆20May 10, 2014Updated 11 years ago
- What's new in Java 8? A developer focuses short presentation (20 min) created with the awesome reveal.js☆27Nov 8, 2014Updated 11 years ago
- Meta-repository of big data tools -- source and essential plugins for hadoop, pig, wukong, storm, kafka etc.☆30Jun 29, 2014Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Jun 4, 2011Updated 14 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 12 years ago
- ZAP add-on containing the web-backdoors and attack files from FuzzDB☆20May 1, 2026Updated last week
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- HTB writeup downloader☆25Aug 11, 2022Updated 3 years ago
- Port scanner in bash☆16Nov 8, 2013Updated 12 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 6 years ago
- Some simple and useful tools☆15May 8, 2018Updated 8 years ago
- A simple, lightweight Android proxy configuration tool. Route any app's traffic through HTTP or SOCKS5 proxies using Android's VPN Servic…☆62Apr 5, 2026Updated last month
- Web interface for recon-ng☆14Nov 22, 2015Updated 10 years ago
- Penetration Testing/Security Cheatsheets☆31Dec 10, 2015Updated 10 years ago
- A repository for personal information data patterns and detection for EU member states. These will be useful to understand how to best de…☆13Jul 10, 2018Updated 7 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago