A small collection of vulnerable code snippets
☆792Sep 30, 2024Updated last year
Alternatives and similar repositories for Broken-Vulnerable-Code-Snippets
Users that are interested in Broken-Vulnerable-Code-Snippets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Twitter vulnerable snippets☆1,126Feb 11, 2026Updated last month
- GPT-3 found hundreds of security vulnerabilities in this repo☆600Mar 13, 2023Updated 3 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 10 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,941Oct 7, 2023Updated 2 years ago
- grep rough audit - source code auditing tool☆1,685Dec 19, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆170Feb 16, 2022Updated 4 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Feb 21, 2022Updated 4 years ago
- ☆134Feb 5, 2021Updated 5 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆542Aug 4, 2022Updated 3 years ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,161May 13, 2023Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,503Jan 8, 2026Updated 2 months ago
- Mind-Maps of Several Things☆2,632Jun 29, 2023Updated 2 years ago
- XSS payloads designed to turn alert(1) into P1☆1,395Sep 12, 2023Updated 2 years ago
- Tips on how to write exploit scripts (faster!)☆563Jul 15, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆720Oct 19, 2024Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,124Aug 14, 2024Updated last year
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆7,057Jun 25, 2025Updated 9 months ago
- OSWE, OSEP, OSED, OSEE☆3,795Jan 2, 2026Updated 2 months ago
- Rockyou for web fuzzing☆3,099Mar 11, 2026Updated 2 weeks ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,588Aug 6, 2023Updated 2 years ago
- The Secure Coding Dojo is a platform for delivering secure coding knowledge.☆596Nov 23, 2025Updated 4 months ago
- A curated list of amazingly awesome Burp Extensions☆3,385Feb 17, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Automatic SSRF fuzzer and exploitation tool☆3,515Sep 4, 2025Updated 6 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,679Sep 8, 2023Updated 2 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆768Aug 21, 2023Updated 2 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Apr 14, 2023Updated 2 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15Updated this week
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,088Jul 29, 2024Updated last year
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,989Sep 5, 2021Updated 4 years ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,276Jan 11, 2026Updated 2 months ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15Mar 3, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Updated this week
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,660Nov 23, 2025Updated 4 months ago
- Burp Suite Certified Practitioner Exam Study☆1,356Mar 12, 2026Updated 2 weeks ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,901Oct 29, 2025Updated 5 months ago
- Contextual Content Discovery Tool☆3,128Apr 29, 2024Updated last year
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆3,025Mar 7, 2026Updated 3 weeks ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,413Sep 14, 2023Updated 2 years ago