jobertabma / vulnerable
A Rails application containing multiple vulnerabilities used for demonstration purposes
☆20Updated 9 years ago
Alternatives and similar repositories for vulnerable:
Users that are interested in vulnerable are comparing it to the libraries listed below
- Alpha version code of Recon UI☆14Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆27Updated 6 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- ☆34Updated 5 years ago
- PHP tool to test XSS☆22Updated 5 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆40Updated 6 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Updated 2 years ago
- A simple remote scanner for Sitecore CMS☆13Updated 9 months ago
- This is a small extension to make graphql readable☆30Updated 6 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Stay on top of new domains! Bug bounty hunters can use this tool to receive Pushbullet notifications each time there is a new target subd…☆26Updated 6 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 7 years ago
- Burp Intruder File Payload Generator☆18Updated 5 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- OAuth Security Cheatsheet☆39Updated 10 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 3 years ago
- Collection of Some Good research Documentation☆27Updated 7 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆10Updated 2 years ago
- BurpSuite Extension Ruby Template to speed up building a Burp Extension using Ruby☆28Updated 8 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆18Updated 6 years ago
- Simple webinterface combining different recon tools.☆12Updated 7 years ago
- Bug Bounty statistics tool.☆31Updated 2 years ago
- An entry level resource to learning bug bounty.☆25Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆22Updated 4 years ago
- Nodejs application intentionally vulnerable to SSRF☆41Updated last year
- OSCP related stuff ^_^ - Try Harder!☆9Updated 6 years ago