rafaelrpinto / VulnerableJavaWebApplicationLinks
A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity
☆21Updated last year
Alternatives and similar repositories for VulnerableJavaWebApplication
Users that are interested in VulnerableJavaWebApplication are comparing it to the libraries listed below
Sorting:
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆165Updated last year
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆118Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆64Updated 2 years ago
- Web Application Security☆129Updated last year
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- A More or less Random Collection of Scripts for security Testing.☆65Updated 3 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Updated 8 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- A very vulnerable serverless application in AWS Lambda☆96Updated 6 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Updated 6 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- Bodhi - Client-side Vulnerability Playground☆121Updated 4 years ago
- OAuth plugin for Burp Suite Extender☆42Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆139Updated 5 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Updated last year
- The simplest way to take an automated screenshot of given URLs. Easy installation! Edit☆49Updated 7 years ago
- Tools to gather subdomains from Bug Bounty programs☆65Updated 7 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Damn Vulnerable eXtensive Training Environment☆106Updated 3 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆81Updated 2 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆114Updated 6 years ago
- Actarus is a custom tool for bug bounty☆77Updated 5 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago