This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability in our blog.
☆14Oct 1, 2016Updated 9 years ago
Alternatives and similar repositories for Race-conditional-vulnerable-Web-application-
Users that are interested in Race-conditional-vulnerable-Web-application- are comparing it to the libraries listed below
Sorting:
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- This script is developed for understanding the Captcha Bypass Vulnerabilties.☆26May 3, 2017Updated 8 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- A rewrite of the popular altDNS subdomain tool by @infosec-au☆12Feb 28, 2019Updated 7 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Archive - Repository contains old publicly released presentations, tools, Proof of Concepts and other junk.☆26Mar 4, 2026Updated 2 weeks ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Feb 9, 2019Updated 7 years ago
- ☆20Oct 19, 2018Updated 7 years ago
- ☆18Jul 22, 2023Updated 2 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Mar 8, 2019Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- A centralized location for all presentations I've given at various conferences☆26Sep 1, 2017Updated 8 years ago
- An hourly updated list of subdomains gathered from certificate transparency logs☆349Oct 13, 2021Updated 4 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆46Aug 13, 2017Updated 8 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Example of using Gauge and OWASP ZAP for test automation☆11Jan 9, 2020Updated 6 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509☆59Jan 6, 2021Updated 5 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- ☆29Jan 15, 2017Updated 9 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year