Examples demonstrating some common web application vulnerabilities.
☆45Dec 15, 2015Updated 10 years ago
Alternatives and similar repositories for owasp-top-10-examples
Users that are interested in owasp-top-10-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2017-5005 for Quick Heal Antivirus☆16Mar 31, 2017Updated 9 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 10 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 4 years ago
- A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.☆69Jan 26, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 4 years ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- Password management and cracking training☆13Jul 15, 2025Updated 9 months ago
- Merges multiple .nessus files into one file.☆46Feb 8, 2023Updated 3 years ago
- An insecure example application (Java)☆33Aug 19, 2025Updated 8 months ago
- Lightweight Ransomware @Choudai☆13May 28, 2018Updated 7 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 8 years ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Feb 20, 2017Updated 9 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- ☆12Jan 20, 2025Updated last year
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 9 months ago
- Automate Brew, MacOS, and NPM Packages. Fork and customize!☆11Mar 11, 2025Updated last year
- CVE-2016-8610 (SSL Death Alert) PoC☆33Dec 28, 2016Updated 9 years ago
- Deeplack is a python script designed for comparing images (screenshots) using DeepAI to detect changes on websites.☆14Jun 19, 2019Updated 6 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Some Of Huawei Routers Exploits☆15Sep 1, 2016Updated 9 years ago
- Kernel module for handling MMC protect status☆15Jun 12, 2014Updated 11 years ago
- Http request smuggling vulnerability scanner☆230Aug 11, 2022Updated 3 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆19Mar 22, 2026Updated last month
- salt state definitions for installing logstash, elasticsearch and kibana☆36Aug 6, 2013Updated 12 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- 安卓activity劫持演示demo,包含指定activity位于前台时的劫持和指定进程位于前台时的劫持☆15Dec 20, 2018Updated 7 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Juniper Junos Space (CVE-2020-1611) (PoC)☆29Jan 22, 2020Updated 6 years ago
- Implementation of clock on ESP chips and Rust(std). Will be re-implemented as a facility monitoring system on bare-metal Rust☆17Feb 23, 2023Updated 3 years ago
- Graylog output plugin that forwards one or more streams of data to Splunk via TCP.☆12Apr 26, 2018Updated 8 years ago
- Concurrent network scanner for CVE-2015-1635☆10Dec 7, 2017Updated 8 years ago
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆23Updated this week
- Prompting and research workflow for lecture building☆16Sep 5, 2025Updated 7 months ago
- android安全工具大全☆41Jun 3, 2015Updated 10 years ago