Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"
☆232Mar 15, 2026Updated this week
Alternatives and similar repositories for pwning-juice-shop
Users that are interested in pwning-juice-shop are comparing it to the libraries listed below
Sorting:
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆462Jan 21, 2026Updated last month
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆308Mar 13, 2026Updated last week
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆12,711Updated this week
- Smart, friendly and helpful chat bot for OWASP Juice Shop☆11Jan 26, 2026Updated last month
- Automated solving script for the OWASP Juice Shop☆26Jul 20, 2023Updated 2 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- University lecture on "IT Security" as Open Educational Resources material☆376Aug 18, 2023Updated 2 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆884Mar 2, 2026Updated 2 weeks ago
- Cloud-Native Microservice Security Bootcamp☆20Jun 11, 2021Updated 4 years ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆17Sep 26, 2024Updated last year
- ☆14Mar 31, 2018Updated 7 years ago
- Blind XSS service alerting over slack or email☆29Aug 6, 2019Updated 6 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆23Oct 14, 2020Updated 5 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆16May 15, 2020Updated 5 years ago
- Burp/ZAP extension that integrate Retire.js repository to find vulnerable Javascript libraries.☆38Dec 14, 2021Updated 4 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆2,025Aug 19, 2021Updated 4 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- online calculator for configuring and comparing bicycle gearing systems☆10Feb 19, 2024Updated 2 years ago
- This project is about creating and publishing threat model examples.☆429Nov 10, 2021Updated 4 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Mar 25, 2024Updated last year
- CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109☆12Sep 13, 2021Updated 4 years ago
- Burp extension to passively scan for applications revealing software version numbers☆33May 30, 2024Updated last year
- ☆12Oct 12, 2013Updated 12 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- scripts to setup pentesting system and use during pentest☆20Jun 1, 2022Updated 3 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- Splunk Dashboard for CobaltStrike logs☆90Mar 16, 2021Updated 5 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- ☆12Aug 8, 2024Updated last year
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- A Game of Hackers (CTF Scoreboard & Game Manager)☆1,092Jul 22, 2025Updated 7 months ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Jun 4, 2025Updated 9 months ago