justmorpheus / very-vulnerable-serverlessLinks
Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless application that serves as a testing environment for security professionals to learn lambda pentesting. The application is designed to demonstrate various security vulnerabilities that can be found in serverless applicat…
☆11Updated last year
Alternatives and similar repositories for very-vulnerable-serverless
Users that are interested in very-vulnerable-serverless are comparing it to the libraries listed below
Sorting:
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆53Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- ☆17Updated 4 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- Exploit scripts☆12Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- ☆15Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- ☆22Updated 4 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆19Updated 6 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- AWS S3 open bucket poc automated script.☆57Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆53Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- Tools and Scripts used in CRTP☆12Updated 5 years ago
- Damn Vulnerable Rails app☆12Updated 12 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- code reviews to practice☆16Updated 4 years ago
- ☆90Updated 3 years ago
- Checks if files is accessible based on the source code.☆16Updated last year
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- ☆38Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆40Updated 2 years ago
- Template used for my OSCP exam.☆29Updated 3 years ago
- ☆49Updated 3 years ago
- ☆27Updated 5 years ago