justmorpheus / very-vulnerable-serverlessLinks
Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless application that serves as a testing environment for security professionals to learn lambda pentesting. The application is designed to demonstrate various security vulnerabilities that can be found in serverless applicat…
☆11Updated last year
Alternatives and similar repositories for very-vulnerable-serverless
Users that are interested in very-vulnerable-serverless are comparing it to the libraries listed below
Sorting:
- Intentionally Vulnerable Nodejs Application & APIs☆21Updated 3 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆55Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- ☆90Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆38Updated 4 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆80Updated 2 years ago
- ☆15Updated 4 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- ☆23Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆98Updated 3 years ago
- Exploit scripts☆12Updated 3 years ago
- ☆17Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- ☆27Updated 5 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Template used for my OSCP exam.☆29Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- AWS S3 open bucket poc automated script.☆57Updated 4 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago