arall / vulnerabilitiesLinks
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
☆29Updated last year
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Security Advisories☆35Updated 3 months ago
- A list of threat sinks used in the manual security source code review for application security☆76Updated 2 years ago
- Host Header Injection Scanner☆50Updated 5 years ago
- ☆73Updated 4 years ago
- The First Open Source Bug Bounty Platform☆97Updated this week
- Execute Trickest workflows right from your terminal☆95Updated 2 months ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Updated 3 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆58Updated 5 years ago
- Vulnerable NodeJS Web Application☆97Updated last year
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆116Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Updated 5 months ago
- Vulnerable demo application for the race condition☆22Updated 4 years ago
- The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks☆36Updated last year
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆114Updated 2 years ago
- ☆49Updated 5 years ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆119Updated 2 years ago
- Workshop given at Hack in Paris 2019☆126Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Updated 2 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆82Updated 3 years ago
- ☆160Updated 4 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Intentionally Vulnerable Nodejs Application & APIs☆21Updated 3 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Updated 3 years ago
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated 2 years ago