juice-shop / juicy-malwareLinks
☆17Updated 4 years ago
Alternatives and similar repositories for juicy-malware
Users that are interested in juicy-malware are comparing it to the libraries listed below
Sorting:
- 📙 User documentation for Caido☆27Updated this week
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆64Updated 4 months ago
- ☆81Updated 2 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆55Updated last year
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆105Updated last year
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆34Updated 5 months ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆74Updated last month
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆45Updated 9 months ago
- blue team, red team stuff. All things cyber ;)☆78Updated last month
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- Source of swisskyrepo.github.io - Public☆23Updated 3 weeks ago
- Hijack a slack bot to phish your way in☆55Updated 2 months ago
- Examples for Gophish templates.☆12Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆48Updated this week
- Vulnerable API for research and education☆46Updated last month
- shamelessly ripped from https://github.com/khalilbijjou/WAFNinja/☆19Updated 8 years ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆421Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆162Updated 7 months ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆21Updated 10 months ago
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitie…☆47Updated last month
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆90Updated 3 months ago
- ☆32Updated 2 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Updated 3 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆51Updated 3 weeks ago
- FrogPost: postMessage Security Testing Tool☆80Updated last month
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆124Updated 2 months ago
- The source of ZAP website☆72Updated this week
- Here are some cool and some unpublished Dorks☆76Updated 5 months ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆38Updated 9 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year