snyk-labs / exploit-workshopLinks
A step by step workshop to exploit various vulnerabilities in Node.js and Java applications
☆158Updated last year
Alternatives and similar repositories for exploit-workshop
Users that are interested in exploit-workshop are comparing it to the libraries listed below
Sorting:
- vulnerable single sign on☆148Updated last year
- A tool geared towards pentesting APIs using OpenAPI definitions.☆181Updated 2 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- Workshop given at Hack in Paris 2019☆124Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- A lab to play with authentication and authorisation problems☆96Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- ☆148Updated 3 years ago
- Everything you need about Burp Extension Generation☆156Updated 2 years ago
- ☆71Updated 5 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- Damn Vulnerable Java (EE) Application☆141Updated last year
- learning case to prepare OSWE☆37Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- HackerOne Wallpapers☆75Updated 4 years ago
- ☆45Updated 5 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆185Updated last year
- A natural evolution of Burp Suite's Repeater tool☆93Updated 2 years ago
- AWS Security Checks☆40Updated 7 years ago
- A natural evolution of Burp Suite's Repeater tool☆199Updated last year
- ☆44Updated 5 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆262Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Updated 3 years ago
- A curated list of amazingly bug bounty tips from security researchers around the world.☆106Updated 6 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆135Updated 5 years ago