An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.
☆11Aug 1, 2024Updated last year
Alternatives and similar repositories for Broken-Web-Application
Users that are interested in Broken-Web-Application are comparing it to the libraries listed below
Sorting:
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- Web interface for recon-ng☆14Nov 22, 2015Updated 10 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆29Jan 22, 2016Updated 10 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- ☆14May 1, 2018Updated 7 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Looking for React.js jobs? Here are the most popular React Interview Questions and Answers which are most likely to be asked by the inter…☆10Jul 18, 2020Updated 5 years ago
- Angular Personal Resume And Portfolio Template☆11Updated this week
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Basic python script for detect airdroid users in lan☆49Sep 30, 2020Updated 5 years ago
- Chrome Extension for XSS Hunter Payloads☆42Sep 7, 2016Updated 9 years ago