A small collection of vulnerable code snippets
☆798Sep 30, 2024Updated last year
Alternatives and similar repositories for Broken-Vulnerable-Code-Snippets
Users that are interested in Broken-Vulnerable-Code-Snippets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Twitter vulnerable snippets☆1,136Feb 11, 2026Updated 2 months ago
- GPT-3 found hundreds of security vulnerabilities in this repo☆600Mar 13, 2023Updated 3 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,674May 24, 2025Updated 10 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,944Oct 7, 2023Updated 2 years ago
- grep rough audit - source code auditing tool☆1,686Dec 19, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆170Feb 16, 2022Updated 4 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Feb 21, 2022Updated 4 years ago
- ☆134Feb 5, 2021Updated 5 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆544Aug 4, 2022Updated 3 years ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,169May 13, 2023Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,507Jan 8, 2026Updated 3 months ago
- Mind-Maps of Several Things☆2,635Jun 29, 2023Updated 2 years ago
- XSS payloads designed to turn alert(1) into P1☆1,395Sep 12, 2023Updated 2 years ago
- Tips on how to write exploit scripts (faster!)☆562Jul 15, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆721Oct 19, 2024Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,172Aug 14, 2024Updated last year
- OSWE, OSEP, OSED, OSEE☆3,798Jan 2, 2026Updated 3 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆330Mar 27, 2024Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆7,078Jun 25, 2025Updated 9 months ago
- Rockyou for web fuzzing☆3,121Mar 11, 2026Updated last month
- The Secure Coding Dojo is a platform for delivering secure coding knowledge.☆598Nov 23, 2025Updated 4 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,644Aug 6, 2023Updated 2 years ago
- A curated list of amazingly awesome Burp Extensions☆3,391Feb 17, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Automatic SSRF fuzzer and exploitation tool☆3,528Sep 4, 2025Updated 7 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,699Sep 8, 2023Updated 2 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆773Aug 21, 2023Updated 2 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Apr 14, 2023Updated 3 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆16Mar 26, 2026Updated 3 weeks ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,104Jul 29, 2024Updated last year
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,997Sep 5, 2021Updated 4 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated last month
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,289Jan 11, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆504Mar 29, 2026Updated 3 weeks ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,745Nov 23, 2025Updated 4 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,905Oct 29, 2025Updated 5 months ago
- Burp Suite Certified Practitioner Exam Study☆1,369Mar 12, 2026Updated last month
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,424Sep 14, 2023Updated 2 years ago
- Contextual Content Discovery Tool☆3,145Apr 29, 2024Updated last year
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆3,048Mar 7, 2026Updated last month