appsecco / dvjaLinks
Damn Vulnerable Java (EE) Application
☆142Updated last year
Alternatives and similar repositories for dvja
Users that are interested in dvja are comparing it to the libraries listed below
Sorting:
- Purposely vulnerable Java application to help lead secure coding workshops☆189Updated last year
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- A tool geared towards pentesting APIs using OpenAPI definitions.☆182Updated 3 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- Workshop given at Hack in Paris 2019☆124Updated 2 years ago
- Damn Vulnerable Cloud Application☆199Updated 7 years ago
- Damn Vulnerable C# Application (API)☆76Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- ☆81Updated 3 years ago
- Parse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in …☆205Updated last year
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆278Updated last month
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆136Updated 5 years ago
- GraphQL security workshop labs☆116Updated 2 weeks ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆77Updated 6 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- Damn Vulnerable Python Web App☆180Updated last year
- Some good resources for getting started with application security☆143Updated 4 years ago
- ☆72Updated 5 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆90Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 9 months ago
- A lab to play with authentication and authorisation problems☆98Updated 2 years ago
- A starter secure code review checklist☆182Updated 6 years ago
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- BurpSuite using the document and some extensions☆70Updated 5 years ago