justmorpheus / very-vulnerable-serverless
Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless application that serves as a testing environment for security professionals to learn lambda pentesting. The application is designed to demonstrate various security vulnerabilities that can be found in serverless applicat…
☆11Updated 8 months ago
Alternatives and similar repositories for very-vulnerable-serverless:
Users that are interested in very-vulnerable-serverless are comparing it to the libraries listed below
- ☆17Updated 3 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆52Updated 3 years ago
- Regex patterns for manual application source code review☆27Updated 4 years ago
- ☆15Updated 3 years ago
- ☆35Updated this week
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆90Updated 3 years ago
- Damn Vulnerable Rails app☆12Updated 12 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Updated last year
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Tool for making it easy to collect dns results from the CLI☆40Updated 7 months ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated last year
- Exploit scripts☆12Updated 2 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆18Updated 6 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- Checks if files is accessible based on the source code.☆16Updated last year
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆124Updated 11 months ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 4 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆121Updated 2 years ago
- ☆17Updated last year
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆51Updated 3 years ago
- Information Security Information From Web☆27Updated 6 months ago
- ☆16Updated 6 years ago