snoopysecurity / Broken-Vulnerable-Code-Snippets
A small collection of vulnerable code snippets
☆729Updated 6 months ago
Alternatives and similar repositories for Broken-Vulnerable-Code-Snippets:
Users that are interested in Broken-Vulnerable-Code-Snippets are comparing it to the libraries listed below
- Twitter vulnerable snippets☆983Updated 2 weeks ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆972Updated 4 months ago
- ☆379Updated 2 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆463Updated 5 months ago
- Burp Suite Certified Practitioner Exam Study☆1,009Updated 2 weeks ago
- Websec interview questions by tib3rius answered☆307Updated last year
- Tips on how to write exploit scripts (faster!)☆471Updated 8 months ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆537Updated 2 years ago
- ☆524Updated 3 years ago
- Watch the latest awesome security talks around the globe☆272Updated last month
- GPT-3 found hundreds of security vulnerabilities in this repo☆602Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆984Updated last year
- ChatGPT Prompts for Bug Bounty & Pentesting☆599Updated last year
- This repo is meant to be a list of companies that hire security people full remote.☆435Updated 7 months ago
- Awesome information for WebSockets security research☆264Updated 3 years ago
- Awesome Vulnerable Applications☆1,148Updated 7 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆311Updated last year
- The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and secu…☆479Updated this week
- oneliner commands for bug bounties☆440Updated 2 years ago
- OSWE Preparation☆611Updated 2 years ago
- Azure and AWS Attacks☆1,100Updated 2 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆211Updated last year
- RepoToStoreBugBountyInfo☆301Updated 5 years ago
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆668Updated 4 years ago
- intentionally vuln web Application Security in django☆253Updated last week
- Repository of Bug-Bounty Writeups☆300Updated last week
- BugBountyTips☆405Updated 9 months ago
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆840Updated last month
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆896Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆744Updated 3 months ago