A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity
☆21Jul 3, 2024Updated last year
Alternatives and similar repositories for VulnerableJavaWebApplication
Users that are interested in VulnerableJavaWebApplication are comparing it to the libraries listed below
Sorting:
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- Vulnerable Java based Web Application☆34Jun 24, 2019Updated 6 years ago
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- Evident Security Platform Custom Signatures Samples☆28Apr 17, 2019Updated 6 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- ☆23Apr 8, 2015Updated 10 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- ☆18Apr 12, 2021Updated 4 years ago
- Forms, emails, and checklists to help with onboarding☆26Sep 6, 2018Updated 7 years ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 2 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Threat Specification Language☆28Oct 6, 2015Updated 10 years ago
- Development repository for the ossec cookbook☆44Feb 20, 2026Updated last week
- How to utilize Chef Environment Pins with ease☆27May 16, 2019Updated 6 years ago
- Vulnerable Java based Web Application☆270Jun 20, 2024Updated last year
- OWASP Top 10 Implemented in ASP.NET MVC☆15Mar 15, 2015Updated 10 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Sep 6, 2014Updated 11 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- A set of XSS vulnerable PHP scripts for testing☆39Feb 10, 2013Updated 13 years ago
- The flowershow site behind flowershow.app☆10Feb 16, 2026Updated last week
- Secure access cloud terraform provider☆13Feb 16, 2026Updated last week
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Mar 7, 2023Updated 2 years ago
- Burp extension that checks for interesting and security headers☆44Aug 12, 2020Updated 5 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- ☆10Jun 30, 2016Updated 9 years ago
- a simple and complete java client to talk to any docker registry☆10Dec 4, 2014Updated 11 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Examples of Docker image build pipelines, including vulnerability scanning with Anchore Engine☆10Mar 6, 2019Updated 6 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- JS lib to create responsive gauges, based on D3 and SVG.☆11May 31, 2019Updated 6 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago