Complete solution for intentionally vulnerable webshop: "Juice Shop"
☆97Feb 18, 2016Updated 10 years ago
Alternatives and similar repositories for juice-shop-walkthrough
Users that are interested in juice-shop-walkthrough are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Training and certifications related to secure software development☆11Feb 9, 2026Updated last month
- OWASP juice shop solutions☆41Oct 26, 2022Updated 3 years ago
- FARO - Document Sensitivity Detector☆11Feb 8, 2021Updated 5 years ago
- Automated solving script for the OWASP Juice Shop☆26Jul 20, 2023Updated 2 years ago
- A write-up of the famous vulnerable Juice Shop by bkimminich☆24Dec 17, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- ☆12Oct 15, 2024Updated last year
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- A tool to encode and decode content as whitespace☆20Sep 24, 2023Updated 2 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- This projects provides a logger and a connected harlem shake js.☆20Updated this week
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, res…☆20Nov 16, 2023Updated 2 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆19Feb 22, 2017Updated 9 years ago
- Independent, self paced lab for learning how to install, configure and use the Service Catalog Tools.☆16Nov 28, 2024Updated last year
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- my dotfiles☆13Oct 5, 2025Updated 5 months ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33May 28, 2019Updated 6 years ago
- Provides content useful for IriusRisk threat modelling, including templates, API scripts, libraries and more.☆16Feb 10, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆30Jan 29, 2026Updated 2 months ago
- OWASP Foundation Web Respository☆17Dec 9, 2025Updated 3 months ago
- This repository contain articles from around the web related to application security. It covers resources for Web , mobile and also nativ…☆12Sep 26, 2016Updated 9 years ago
- This GitHub repository contains lessons for developing Microsoft Security CoPilot plugins☆20May 15, 2024Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- PeekFx allows loading and decompilation of groups of .NET framework assemblies.☆28Feb 1, 2023Updated 3 years ago
- ☆25Updated this week
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Oct 15, 2017Updated 8 years ago
- A Deliberately Insecure Web Application☆71Jan 9, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple place to learn XSS☆31Mar 20, 2021Updated 5 years ago
- cubicsdr.readthedocs.io☆17Nov 23, 2020Updated 5 years ago
- Highlight Burp proxy requests made by different browsers☆29Sep 21, 2017Updated 8 years ago
- ☆10May 31, 2020Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"☆232Mar 22, 2026Updated last week
- Check if your code is running on Heroku☆19Jun 21, 2023Updated 2 years ago