snoopysecurity / Broken-Vulnerable-Code-SnippetsLinks
A small collection of vulnerable code snippets
☆769Updated last year
Alternatives and similar repositories for Broken-Vulnerable-Code-Snippets
Users that are interested in Broken-Vulnerable-Code-Snippets are comparing it to the libraries listed below
Sorting:
- Twitter vulnerable snippets☆1,077Updated 7 months ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,041Updated 11 months ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆542Updated 3 years ago
- Burp Suite Certified Practitioner Exam Study☆1,218Updated 2 weeks ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,260Updated 3 months ago
- This repo contains the code for my secure code review challenges. People used this as the primary resource to pass FAANG AppSec interview…☆249Updated last month
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆853Updated last month
- A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms…☆816Updated 4 months ago
- Awesome Vulnerable Applications☆1,276Updated last year
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆528Updated last week
- ChatGPT Prompts for Bug Bounty & Pentesting☆670Updated 2 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆832Updated last month
- GPT-3 found hundreds of security vulnerabilities in this repo☆600Updated 2 years ago
- 🐛 A list of writeups from the Google VRP Bug Bounty program☆1,359Updated 2 weeks ago
- Tips on how to write exploit scripts (faster!)☆524Updated last year
- Websec interview questions by tib3rius answered☆310Updated 2 years ago
- Attack surface detector that identifies endpoints by static analysis☆863Updated last week
- ☆338Updated 4 months ago
- Awesome information for WebSockets security research☆294Updated 3 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆496Updated last year
- A OWASP Based Checklist With 500+ Test Cases☆805Updated 3 years ago
- Collection of Facebook Bug Bounty Writeups☆677Updated 2 months ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆303Updated last year
- ☆531Updated 4 years ago
- Repository of Bug-Bounty Writeups☆331Updated 3 months ago
- completely ridiculous API (crAPI)☆1,365Updated this week
- ☆705Updated 2 weeks ago
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆677Updated 5 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆710Updated this week
- This repo is meant to be a list of companies that hire security people full remote.☆456Updated 5 months ago