juice-shop / pwning-juice-shopLinks
Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"
☆231Updated last week
Alternatives and similar repositories for pwning-juice-shop
Users that are interested in pwning-juice-shop are comparing it to the libraries listed below
Sorting:
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆457Updated last month
- The ZAP Heads Up Display (HUD)☆271Updated last week
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆134Updated 3 years ago
- Some good resources for getting started with application security☆142Updated 4 years ago
- A starter secure code review checklist☆184Updated 7 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆359Updated 5 years ago
- Damn Vulnerable Java (EE) Application☆144Updated last year
- A curated list of vulnerable web applications.☆329Updated 2 years ago
- A simple web app with a XXE vulnerability.☆229Updated 4 years ago
- Repo for all the SKF Docker lab examples☆461Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- A tool geared towards pentesting APIs using OpenAPI definitions.☆182Updated 3 years ago
- Collection of links to Security stuff☆117Updated 3 months ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆246Updated 6 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆880Updated 2 weeks ago
- The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.☆280Updated last year
- ☆276Updated 4 years ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆322Updated last year
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Updated 4 years ago
- Automatically exported from code.google.com/p/domxsswiki☆548Updated 7 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆174Updated 6 years ago
- Curated list of public penetration testing reports released by several consulting firms☆48Updated 7 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- stuff i'm willing to share with the world lol☆170Updated 3 years ago
- ☆218Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆110Updated 2 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆471Updated 3 years ago
- 🤙 Security Trivia that rare people know.☆161Updated 6 years ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆303Updated this week
- The OWASP AppSec Browser Bundle is an open source Linux based penetration testing browser bundle built over Mozilla Firefox. It comes pre…☆97Updated 12 years ago