appsecco / dvjaLinks
Damn Vulnerable Java (EE) Application
☆143Updated last year
Alternatives and similar repositories for dvja
Users that are interested in dvja are comparing it to the libraries listed below
Sorting:
- Purposely vulnerable Java application to help lead secure coding workshops☆190Updated last year
- A tool geared towards pentesting APIs using OpenAPI definitions.☆182Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆134Updated 2 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- Damn Vulnerable Cloud Application☆199Updated 7 years ago
- Parse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in …☆205Updated last year
- ☆82Updated 3 years ago
- Workshop given at Hack in Paris 2019☆125Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- Damn Vulnerable Python Web App☆181Updated last year
- GraphQL security workshop labs☆116Updated last month
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆137Updated 5 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated last year
- Damn Vulnerable C# Application (API)☆77Updated last year
- BurpSuite using the document and some extensions☆71Updated 5 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- A starter secure code review checklist☆182Updated 6 years ago
- ☆259Updated last year
- ☆205Updated this week
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆77Updated 6 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆289Updated 2 months ago
- Some good resources for getting started with application security☆141Updated 4 years ago
- AWS Security Checks☆40Updated 7 years ago
- A step by step workshop to exploit various vulnerabilities in Node.js and Java applications☆157Updated last year
- ☆85Updated 2 years ago