Demo of a webapp with flawed security, for training purposes
☆20Apr 10, 2023Updated 2 years ago
Alternatives and similar repositories for ticketmagpie
Users that are interested in ticketmagpie are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Solutions to CTF problems.☆11May 29, 2016Updated 9 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- CTF Write-ups☆27Apr 7, 2019Updated 6 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- ☆20Jul 2, 2021Updated 4 years ago
- Personal Notes.☆11Jun 2, 2018Updated 7 years ago
- Android Testing☆16Mar 24, 2014Updated 12 years ago
- Security Tools written in Golang☆12Sep 2, 2020Updated 5 years ago
- Blockchain implementation from scratch in Go with Kubernetes☆11Mar 25, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆13May 17, 2016Updated 9 years ago
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 9 years ago
- INACTIVE - Security Testing Tool☆107Feb 18, 2016Updated 10 years ago
- Deliberately vulnerable web application☆22Jun 18, 2017Updated 8 years ago
- Grails plugin for sanitizing XSS from the user input.☆17Dec 24, 2018Updated 7 years ago
- this is a demo set of attacks that can be used to get started with gauntlt☆27Dec 14, 2015Updated 10 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- A simple powershell script which gives handy compliance report.☆19Nov 27, 2017Updated 8 years ago
- ☆16Oct 8, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Gradle plugin for running tests in Docker environments☆19Jan 14, 2021Updated 5 years ago
- A Vue App for quickly generating KML Search Grids☆13Nov 12, 2024Updated last year
- E2E encrypted ephemeral messaging app. Share secrets securely without setup. Built with Next.js, Soketi, and OpenPGP.js. Self-hostable.☆11Sep 16, 2024Updated last year
- A CUI Struts2 Vulnerability Exploit☆16Jul 29, 2016Updated 9 years ago
- A sample comments system with Node.js, Express and Mongoose☆15Aug 7, 2022Updated 3 years ago
- Installs Cassandra & DataStax Agent on RHEL/Ubuntu/Debian.☆13Mar 16, 2026Updated last week
- Any code for preparing for OSCE☆12Oct 31, 2017Updated 8 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- Hello and welcome to my GitHub account. If you'd like to know more about me, this is likely the best place to start☆16Oct 4, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- OWASP Annotated Application Verfication Standard☆17Mar 30, 2022Updated 3 years ago
- IoT device: Hardware & Firmware☆22Nov 13, 2019Updated 6 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- Another dll injection tool.☆28Jan 25, 2015Updated 11 years ago
- ☆20Oct 19, 2018Updated 7 years ago