juice-shop / juice-shopLinks
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
☆11,394Updated last week
Alternatives and similar repositories for juice-shop
Users that are interested in juice-shop are comparing it to the libraries listed below
Sorting:
- This repo was created for the Java full stack learning using html-css-js as the FE, SpringBoot as BE and MongoDb as the Data Source☆8Updated 5 months ago
- WebGoat is a deliberately insecure application☆7,570Updated last week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆17,800Updated last week
- Official OWASP Top 10 Document Repository☆4,656Updated 7 months ago
- 🎯 Command Injection Payload List☆3,357Updated 11 months ago
- The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.☆8,067Updated this week
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,318Updated this week
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,087Updated 4 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,787Updated 8 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,625Updated 2 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,339Updated 9 months ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆4,295Updated last week
- Next generation web scanner☆5,935Updated 11 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆9,985Updated last week
- Find, verify, and analyze leaked credentials☆19,668Updated this week
- Web and mobile application security training platform☆1,389Updated last year
- A curated list of CTF frameworks, libraries, resources and softwares☆10,479Updated 11 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,427Updated last year
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,173Updated last year
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,235Updated last month
- Fast subdomains enumeration tool for penetration testers☆10,448Updated 11 months ago
- 🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List☆7,209Updated 11 months ago
- Monitor linux processes without root permissions☆5,511Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,339Updated 8 months ago
- Nikto web server scanner☆9,402Updated this week
- List of Awesome Red Teaming Resources☆7,322Updated last year
- Fast web fuzzer written in Go☆14,211Updated 2 months ago
- 🔥 Web-application firewalls (WAFs) from security standpoint.☆6,726Updated 8 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,286Updated 2 months ago
- Automated Adversary Emulation Platform☆6,240Updated last month