A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.
☆10Jun 15, 2023Updated 2 years ago
Alternatives and similar repositories for vulnerable-app
Users that are interested in vulnerable-app are comparing it to the libraries listed below
Sorting:
- Demo Code for the Xpring SDK☆11Aug 31, 2023Updated 2 years ago
- AWS Lambda-based push notifications.☆14Aug 19, 2016Updated 9 years ago
- Initiates PostgreSQL streaming replication using rsync and ssh☆20May 16, 2013Updated 12 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆11Jan 29, 2024Updated 2 years ago
- Spring Design Patterns and Best Practices [video], published by Packt☆13Jan 30, 2023Updated 3 years ago
- Learning Flutter with Rick Grimes.☆16Jun 4, 2020Updated 5 years ago
- ☆23May 2, 2018Updated 7 years ago
- Sencha Cmd 5 + Sencha ExtJS 5 + Maven integration in Java web application☆18Mar 15, 2015Updated 11 years ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- ☆14Sep 30, 2020Updated 5 years ago
- Example used in the Cloud Build GitHub app tutorial☆19Oct 29, 2024Updated last year
- Flutterzon is a full-stack e-commerce application that tries to mirror the functionality and user experience of the Amazon mobile app. Bu…☆19Dec 12, 2023Updated 2 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- Simple wrapper around Chargify's REST API for node.js☆17Jun 8, 2021Updated 4 years ago
- Sample application wiring ExtJS with Spring MVC 3.0☆23Jan 11, 2011Updated 15 years ago
- ☆11May 30, 2021Updated 4 years ago
- PHP Emulator☆13Dec 18, 2016Updated 9 years ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- Aspectj load-time weaving scripting agent☆16Mar 5, 2017Updated 9 years ago
- A vulnerable Play application for attackers.☆18Mar 3, 2026Updated 2 weeks ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- An explanatory Python project template using pip-conflict-checker for dependency management☆11Sep 22, 2015Updated 10 years ago
- whois.cynthia.re V2☆13May 23, 2021Updated 4 years ago
- Exploiting CVE-2017-7525 demo project with Angular7 frontend and Spring.☆18Feb 21, 2019Updated 7 years ago
- A solution for CodeBuild custom webhook notifications☆15Oct 20, 2021Updated 4 years ago
- The comtest nist eclipse plugin extension☆14Jun 24, 2015Updated 10 years ago
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 11 years ago
- ☆20Mar 3, 2018Updated 8 years ago
- ☆18Aug 6, 2019Updated 6 years ago
- Run a task on AWS ECS and stream output☆15Jul 26, 2024Updated last year
- ☆14May 21, 2017Updated 8 years ago
- Fixed version of pcsensor0.0.1☆16Oct 31, 2014Updated 11 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Python Library for Chargify.com☆23Aug 8, 2020Updated 5 years ago
- ☆49Feb 10, 2019Updated 7 years ago
- An e-commerce web application in Vue.js Framework with Vuex state management, Stripe payment gateway, Node.js backend and MySQL database.☆33Oct 22, 2025Updated 4 months ago
- Damn Simple Vulnerable Python Web Application☆18Jun 5, 2024Updated last year
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago