h4x0r101 / Damn-Vulnerable-Source-CodeLinks
The aim of the project is to develop intentionally vulnerable source code in various languages.
☆14Updated 5 years ago
Alternatives and similar repositories for Damn-Vulnerable-Source-Code
Users that are interested in Damn-Vulnerable-Source-Code are comparing it to the libraries listed below
Sorting:
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- ☆20Updated 4 years ago
- Information Security Information From Web☆28Updated 3 months ago
- ☆22Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- Template used for my OSCP exam.☆29Updated 3 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆41Updated 2 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆21Updated last year
- ☆20Updated 3 years ago
- ☆17Updated 4 years ago
- A solid recon tool I use personally.☆30Updated 2 years ago
- Exploit scripts☆12Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 5 years ago
- Script for Bug Bounty☆29Updated 4 years ago
- ☆19Updated 4 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Updated 2 years ago
- Damn Vulnerable Rails app☆13Updated 13 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 3 months ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- ☆49Updated 5 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- Vulnerable Windows Application☆17Updated last year
- ☆18Updated 4 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Updated 3 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- Enhanced 403 bypass header☆21Updated 3 years ago