juice-shop / pwning-juice-shop
Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"
☆225Updated this week
Alternatives and similar repositories for pwning-juice-shop:
Users that are interested in pwning-juice-shop are comparing it to the libraries listed below
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆417Updated last week
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆348Updated 4 years ago
- The ZAP Heads Up Display (HUD)☆258Updated last month
- Some good resources for getting started with application security☆141Updated 3 years ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆282Updated this week
- ☆274Updated 3 years ago
- A curated list of vulnerable web applications.☆286Updated last year
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆878Updated 4 months ago
- A collection of templates for bug bounty reporting☆392Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆120Updated 2 years ago
- Automatically exported from code.google.com/p/domxsswiki☆526Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆101Updated last year
- HTTP file upload scanner for Burp Proxy☆400Updated last year
- Fast and easy script to manage pentesting training apps☆340Updated last year
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆451Updated 5 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆465Updated 4 months ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆236Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆108Updated 7 years ago
- Damn Vulnerable Java (EE) Application☆134Updated last year
- ☆423Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆309Updated 11 months ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆174Updated 2 years ago
- How to prepare for OSCP complete guide☆129Updated 5 years ago
- A simple web app with a XXE vulnerability.☆225Updated 3 years ago
- ☆549Updated last year
- Repo for all the OWASP-SKF Docker lab examples☆445Updated 7 months ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆440Updated 4 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆177Updated 8 months ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆229Updated 5 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆257Updated 3 years ago