juice-shop / pwning-juice-shop
Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"
☆226Updated last week
Alternatives and similar repositories for pwning-juice-shop:
Users that are interested in pwning-juice-shop are comparing it to the libraries listed below
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆452Updated 5 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆879Updated 5 months ago
- The ZAP Heads Up Display (HUD)☆259Updated last month
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆417Updated last month
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆350Updated 4 years ago
- Some good resources for getting started with application security☆142Updated 3 years ago
- Repository for hosting my research papers☆506Updated 11 months ago
- A simple web app with a XXE vulnerability.☆226Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆123Updated 2 years ago
- ☆274Updated 3 years ago
- ☆424Updated 2 years ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆282Updated last week
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆311Updated last year
- A curated list of vulnerable web applications.☆290Updated last year
- Damn Vulnerable Java (EE) Application☆138Updated last year
- A collection of templates for bug bounty reporting☆392Updated 3 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆463Updated 2 years ago
- stuff i'm willing to share with the world lol☆171Updated 2 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆271Updated 4 years ago
- Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information! It's yo…☆215Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆101Updated last year
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆257Updated 3 years ago
- Automatically exported from code.google.com/p/domxsswiki☆525Updated 6 years ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆237Updated 5 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆179Updated 9 months ago
- ☆360Updated 3 years ago
- Bugbounty scope tool☆327Updated 3 weeks ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆174Updated 2 years ago
- The Bug Bounty Wiki☆172Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆109Updated 7 years ago