fportantier / vulpyLinks
Vulnerable Python Application To Learn Secure Development
☆114Updated last year
Alternatives and similar repositories for vulpy
Users that are interested in vulpy are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Python Web App☆176Updated last year
- Damn Vulnerable Java (EE) Application☆141Updated last year
- Some good resources for getting started with application security☆142Updated 4 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆184Updated last year
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆61Updated 2 weeks ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆28Updated 3 years ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆136Updated 2 years ago
- intentionally vuln web Application Security in django☆272Updated 3 weeks ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆43Updated last year
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆160Updated 4 years ago
- A starter secure code review checklist☆182Updated 6 years ago
- ☆190Updated 2 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆128Updated 2 years ago
- Collection of links to Security stuff☆115Updated 2 weeks ago
- Desktop variant of OWASP Threat Dragon☆77Updated 4 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆210Updated 9 months ago
- Python API library for DefectDojo☆42Updated 2 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Updated 6 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆80Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- ☆88Updated 4 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆172Updated 6 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆75Updated 4 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last month
- Penetration Testing Checklist☆36Updated 5 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆51Updated this week
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- OWASP Code Review Guide Web Repository☆139Updated 3 years ago
- ☆124Updated last year
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆104Updated 2 years ago