snoopysecurity / Broken-Vulnerable-Code-SnippetsLinks
A small collection of vulnerable code snippets
☆775Updated last year
Alternatives and similar repositories for Broken-Vulnerable-Code-Snippets
Users that are interested in Broken-Vulnerable-Code-Snippets are comparing it to the libraries listed below
Sorting:
- Twitter vulnerable snippets☆1,081Updated 9 months ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,152Updated last year
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆500Updated last year
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆541Updated 3 years ago
- A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms…☆836Updated last month
- Burp Suite Certified Practitioner Exam Study☆1,262Updated last month
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆855Updated 3 months ago
- This repo contains the code for my secure code review challenges. People used this as the primary resource to pass FAANG AppSec interview…☆285Updated 3 weeks ago
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆674Updated 5 years ago
- Repo for all the SKF Docker lab examples☆461Updated last year
- ChatGPT Prompts for Bug Bounty & Pentesting☆678Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,271Updated 4 months ago
- Awesome Vulnerable Applications☆1,302Updated 3 weeks ago
- GPT-3 found hundreds of security vulnerabilities in this repo☆601Updated 2 years ago
- ☆348Updated 6 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆765Updated 5 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆314Updated 4 months ago
- Websec interview questions by tib3rius answered☆307Updated 2 years ago
- Tips on how to write exploit scripts (faster!)☆537Updated last year
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆313Updated last month
- 🐛 A list of writeups from the Google VRP Bug Bounty program☆1,391Updated last month
- completely ridiculous API (crAPI)☆1,396Updated 2 weeks ago
- Collection of Facebook Bug Bounty Writeups☆685Updated 3 months ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆972Updated this week
- ☆714Updated this week
- Repository of Bug-Bounty Writeups☆338Updated last month
- A OWASP Based Checklist With 500+ Test Cases☆832Updated 3 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆761Updated 2 weeks ago
- The motive to build this repo is to help beginner to start learn Android Pentesting by providing a roadmap.☆433Updated 3 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆848Updated 2 months ago