snoopysecurity / Vulnerable-Code-Snippets
A small collection of vulnerable code snippets
☆703Updated last month
Related projects ⓘ
Alternatives and complementary repositories for Vulnerable-Code-Snippets
- Twitter vulnerable snippets☆942Updated 3 weeks ago
- ChatGPT Prompts for Bug Bounty & Pentesting☆554Updated last year
- A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms…☆637Updated 5 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆941Updated 10 months ago
- Tips on how to write exploit scripts (faster!)☆419Updated 4 months ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆928Updated 3 months ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆527Updated 2 years ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆829Updated last year
- Burp Suite Certified Practitioner Exam Study☆920Updated 3 weeks ago
- ☆523Updated 3 years ago
- GPT-3 found hundreds of security vulnerabilities in this repo☆599Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,421Updated 5 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆274Updated 7 months ago
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆823Updated last month
- Mind-Maps of Several Things☆2,451Updated last year
- 🐛 A list of writeups from the Google VRP Bug Bounty program☆1,146Updated last week
- A Huge Learning Resources with Labs For Offensive Security Players☆910Updated 2 years ago
- Azure and AWS Attacks☆1,048Updated last year
- ☆1,177Updated 2 years ago
- Watch the latest awesome security talks around the globe☆261Updated 2 years ago
- 1337 Wordlists for Bug Bounty Hunting☆790Updated 2 weeks ago
- Conference presentation slides☆1,509Updated last week
- ☆581Updated this week
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆543Updated this week
- bypass-url-parser☆1,021Updated this week
- PDF Files for Pentesting☆455Updated last month
- Awesome information for WebSockets security research☆252Updated 2 years ago
- Attack surface detector that identifies endpoints by static analysis☆607Updated this week
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆845Updated 10 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆533Updated 11 months ago