blabla1337 / skf-labsLinks
Repo for all the SKF Docker lab examples
☆461Updated last year
Alternatives and similar repositories for skf-labs
Users that are interested in skf-labs are comparing it to the libraries listed below
Sorting:
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆500Updated last year
- OSWE Preparation☆649Updated 3 years ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆246Updated 6 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆745Updated 2 years ago
- A simple web app with a XXE vulnerability.☆229Updated 4 years ago
- ☆1,010Updated 3 years ago
- Simple websites vulnerable to Server Side Template Injections(SSTI)☆412Updated 2 years ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆490Updated 2 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆152Updated 5 years ago
- HTTP file upload scanner for Burp Proxy☆415Updated 2 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆922Updated 11 months ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆448Updated 3 weeks ago
- A curated list of vulnerable web applications.☆329Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆270Updated 2 years ago
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆857Updated 3 months ago
- A starter secure code review checklist☆184Updated 7 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆415Updated 5 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆640Updated 5 months ago
- ☆369Updated 3 years ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆400Updated 4 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆322Updated last year
- this html file creates a csrf poc form to any http request.☆280Updated 3 years ago
- 🎯 Open Redirect Payload List☆632Updated last year
- List DTDs and generate XXE payloads using those local DTDs.☆644Updated last year
- A wordlist of API names for web application assessments☆859Updated 6 months ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆451Updated 5 years ago
- Security Testing Scripts for JWT☆327Updated 3 years ago
- An automated target reconnaissance pipeline.☆445Updated 2 years ago