juice-shop / pwning-juice-shopLinks
Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"
☆229Updated last week
Alternatives and similar repositories for pwning-juice-shop
Users that are interested in pwning-juice-shop are comparing it to the libraries listed below
Sorting:
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆430Updated last week
- The ZAP Heads Up Display (HUD)☆265Updated 5 months ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆353Updated 4 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆128Updated 2 years ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- Repo for all the SKF Docker lab examples☆453Updated 11 months ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆178Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆139Updated last year
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆881Updated 8 months ago
- A simple web app with a XXE vulnerability.☆228Updated 3 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Updated 6 years ago
- Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information! It's yo…☆216Updated 5 years ago
- Collection of links to Security stuff☆115Updated 6 months ago
- ☆276Updated 3 years ago
- These are the regexes that power truffleHog☆217Updated 2 years ago
- A curated list of vulnerable web applications.☆305Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆184Updated last year
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆744Updated 3 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆173Updated 6 years ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆242Updated 5 years ago
- ☆219Updated 3 years ago
- The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.☆273Updated 11 months ago
- A starter secure code review checklist☆182Updated 6 years ago
- ☆113Updated 4 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆526Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆316Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- Damn Vulnerable Cloud Application☆195Updated 6 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- Automatically exported from code.google.com/p/domxsswiki☆537Updated 7 years ago