A small collection of vulnerable code snippets
☆796Sep 30, 2024Updated last year
Alternatives and similar repositories for Broken-Vulnerable-Code-Snippets
Users that are interested in Broken-Vulnerable-Code-Snippets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Twitter vulnerable snippets☆1,152Feb 11, 2026Updated 2 months ago
- GPT-3 found hundreds of security vulnerabilities in this repo☆600Mar 13, 2023Updated 3 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,680May 24, 2025Updated 11 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,948Oct 7, 2023Updated 2 years ago
- grep rough audit - source code auditing tool☆1,686Dec 19, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆172Feb 16, 2022Updated 4 years ago
- ☆135Feb 5, 2021Updated 5 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Feb 21, 2022Updated 4 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆544Aug 4, 2022Updated 3 years ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,210May 13, 2023Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,512Jan 8, 2026Updated 4 months ago
- Mind-Maps of Several Things☆2,650Jun 29, 2023Updated 2 years ago
- XSS payloads designed to turn alert(1) into P1☆1,396Sep 12, 2023Updated 2 years ago
- Tips on how to write exploit scripts (faster!)☆568Jul 15, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆722Oct 19, 2024Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,210Aug 14, 2024Updated last year
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- OSWE, OSEP, OSED, OSEE☆3,817Jan 2, 2026Updated 4 months ago
- Collection of methodology and test case for various web vulnerabilities.☆7,106Jun 25, 2025Updated 10 months ago
- Rockyou for web fuzzing☆3,141Mar 11, 2026Updated last month
- The Secure Coding Dojo is a platform for delivering secure coding knowledge.☆601Nov 23, 2025Updated 5 months ago
- A curated list of amazingly awesome Burp Extensions☆3,392Feb 17, 2026Updated 2 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,816Aug 6, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatic SSRF fuzzer and exploitation tool☆3,539Sep 4, 2025Updated 8 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,722Sep 8, 2023Updated 2 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆775Aug 21, 2023Updated 2 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15Mar 26, 2026Updated last month
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Apr 14, 2023Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,114Jul 29, 2024Updated last year
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆2,002Sep 5, 2021Updated 4 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated 2 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,306Jan 11, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆508Mar 29, 2026Updated last month
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,789May 1, 2026Updated last week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,913Oct 29, 2025Updated 6 months ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,471Sep 14, 2023Updated 2 years ago
- Burp Suite Certified Practitioner Exam Study☆1,383Mar 12, 2026Updated last month
- Contextual Content Discovery Tool☆3,165Apr 29, 2024Updated 2 years ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆3,060Mar 7, 2026Updated 2 months ago