fportantier / vulpy
Vulnerable Python Application To Learn Secure Development
☆102Updated 10 months ago
Alternatives and similar repositories for vulpy:
Users that are interested in vulpy are comparing it to the libraries listed below
- Damn Vulnerable Java (EE) Application☆135Updated last year
- Damn Vulnerable Python Web App☆168Updated 10 months ago
- Some good resources for getting started with application security☆142Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆123Updated 2 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆179Updated 9 months ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we …☆35Updated this week
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆135Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆45Updated this week
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆25Updated 2 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆69Updated last year
- Python API library for DefectDojo☆41Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated last year
- intentionally vuln web Application Security in django☆253Updated last week
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆311Updated last year
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 3 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆156Updated 3 years ago
- Penetration Testing Checklist☆35Updated 4 years ago
- Common Security Interview Questions with Answers☆28Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 9 months ago
- ☆76Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆203Updated 4 months ago
- A curated list of Awesome Security Challenges.☆179Updated 4 months ago
- materials we hand out☆141Updated 3 weeks ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- ☆86Updated 3 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆104Updated last year