appsecco / dvjaLinks
Damn Vulnerable Java (EE) Application
☆141Updated last year
Alternatives and similar repositories for dvja
Users that are interested in dvja are comparing it to the libraries listed below
Sorting:
- Purposely vulnerable Java application to help lead secure coding workshops☆185Updated last year
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆80Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆128Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆43Updated last year
- A tool geared towards pentesting APIs using OpenAPI definitions.☆181Updated 2 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- ☆81Updated 3 years ago
- Damn Vulnerable Python Web App☆176Updated last year
- Workshop given at Hack in Paris 2019☆123Updated 2 years ago
- Damn Vulnerable Cloud Application☆197Updated 6 years ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆201Updated 3 months ago
- A starter secure code review checklist☆182Updated 6 years ago
- Parse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in …☆204Updated last year
- Damn Vulnerable C# Application (API)☆74Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆135Updated 4 years ago
- ☆83Updated 2 years ago
- GraphQL security workshop labs☆113Updated last month
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆77Updated 5 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆320Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆104Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- A step by step workshop to exploit various vulnerabilities in Node.js and Java applications☆158Updated last year
- OWASP Code Review Guide Web Repository☆139Updated 3 years ago
- Awesome information for WebSockets security research☆275Updated 3 years ago
- A framework built on top of Burp's Python Scripter extension.☆89Updated last year
- Detectify Crowdsource Challenge☆69Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 7 months ago
- Vulnerable Python Application To Learn Secure Development☆114Updated last year