djadmin / vulnerable-appLinks
A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.
☆10Updated last year
Alternatives and similar repositories for vulnerable-app
Users that are interested in vulnerable-app are comparing it to the libraries listed below
Sorting:
- ☆23Updated 2 years ago
- Security test tool for Blind XSS☆26Updated 5 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Updated 4 months ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 4 years ago
- Bug Bounty Tools☆34Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Updated last year
- Accompanying material needed for the workshop☆11Updated last year
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Updated 5 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- ☆36Updated 4 months ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago
- a tool that compiles a csv of all h1 program stats☆47Updated last year
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆74Updated last year
- ☆59Updated 11 months ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 4 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆19Updated 4 years ago
- ☆30Updated last year
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated last year
- ☆32Updated 6 years ago
- web-based-fuzzer☆32Updated 4 years ago
- ☆13Updated 4 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- ☆15Updated 4 years ago
- List of nearly 7 lakhs subdomains in scope probed using httpx to feed to nuclei☆8Updated 4 years ago