hdiv / insecure-bank
An insecure example application (Java)
☆33Updated 2 months ago
Alternatives and similar repositories for insecure-bank:
Users that are interested in insecure-bank are comparing it to the libraries listed below
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Updated last year
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- ☆32Updated last year
- Provides a suite of Burp extensions and a maven plugin to automate security tests using BurpSuite.☆25Updated 6 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 11 months ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- ☆22Updated 2 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆116Updated 3 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆111Updated 6 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- AWS Security Checks☆37Updated 7 years ago
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 4 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆69Updated last year
- ☆12Updated 7 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆43Updated 8 months ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Updated 6 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago
- ☆34Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆101Updated last year
- Scripts that we use for pentesting☆42Updated 8 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Updated 5 years ago
- InfoSec OpenAI Examples☆19Updated last year