An insecure example application (Java)
☆33Aug 19, 2025Updated 7 months ago
Alternatives and similar repositories for insecure-bank
Users that are interested in insecure-bank are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- code reviews to practice☆18Jul 22, 2021Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- IriusRisk Community☆72Sep 5, 2023Updated 2 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Mar 21, 2026Updated last week
- POC for CVE-2018-1273☆24Jun 5, 2018Updated 7 years ago
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- Checkmarx Scan and Result Orchestration☆100Dec 26, 2025Updated 3 months ago
- This is all the files related to youtube videos on my youtube channel nothing much else☆12Aug 12, 2024Updated last year
- Github action that installs SDKs served up by the AdoptOpenJDK API☆12May 8, 2024Updated last year
- A very vulnerable implementation of a GraphQL API.☆17Mar 13, 2026Updated 2 weeks ago
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Apr 23, 2020Updated 5 years ago
- ☆16Mar 7, 2026Updated 3 weeks ago
- Rockyou for web fuzzing☆15Jan 28, 2022Updated 4 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆22Mar 17, 2026Updated last week
- A series of writes about “Binary Exploitation”.☆85Jun 25, 2023Updated 2 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- A prototype that became our first platformer.☆22Mar 16, 2023Updated 3 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Feb 7, 2018Updated 8 years ago
- ☆16Oct 8, 2025Updated 5 months ago
- ☆10Aug 28, 2020Updated 5 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- ☆10Nov 27, 2016Updated 9 years ago
- Examples demonstrating some common web application vulnerabilities.☆46Dec 15, 2015Updated 10 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- R Code + R Notebook on how to process and visualize the official IMDb datasets.☆12Jul 16, 2018Updated 7 years ago
- Euphoria is a streaming server for video, audio and other files☆13Mar 19, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Jan 11, 2023Updated 3 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Aug 30, 2018Updated 7 years ago
- Bulk IP to ASN submission to the Team Cymru Whois server. More info: http://www.team-cymru.org/IP-ASN-mapping.html☆15Oct 30, 2023Updated 2 years ago
- ☆10Jan 2, 2016Updated 10 years ago
- Generic ASM Vulnerability Schema XSLT☆12May 30, 2018Updated 7 years ago
- Cheat Sheets☆12Feb 25, 2019Updated 7 years ago