snyk-labs / exploit-workshopLinks
A step by step workshop to exploit various vulnerabilities in Node.js and Java applications
☆157Updated last year
Alternatives and similar repositories for exploit-workshop
Users that are interested in exploit-workshop are comparing it to the libraries listed below
Sorting:
- vulnerable single sign on☆148Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆110Updated 2 years ago
- ☆45Updated 5 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆182Updated 3 years ago
- ☆148Updated 3 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆359Updated 5 years ago
- learning case to prepare OSWE☆37Updated 6 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- Everything you need about Burp Extension Generation☆157Updated 2 years ago
- A lab to play with authentication and authorisation problems☆98Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- ☆72Updated 5 years ago
- Workshop given at Hack in Paris 2019☆125Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆144Updated last year
- [A]ndroid [A]pplication [P]entest [G]uide☆122Updated 6 years ago
- A natural evolution of Burp Suite's Repeater tool☆94Updated 2 years ago
- Pentesting/Bugbounty Dockerfiles.☆176Updated 4 years ago
- A natural evolution of Burp Suite's Repeater tool☆200Updated last year
- A curated list of amazingly bug bounty tips from security researchers around the world.☆104Updated 6 years ago
- ☆44Updated 5 years ago
- ☆76Updated 5 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆135Updated 6 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆109Updated 6 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Updated 3 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆82Updated 2 years ago
- HackerOne Wallpapers☆76Updated 4 years ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆68Updated 4 years ago