stephenbradshaw / breakableflaskLinks
Simple vulnearable Flask web application
☆29Updated 5 years ago
Alternatives and similar repositories for breakableflask
Users that are interested in breakableflask are comparing it to the libraries listed below
Sorting:
- Material from presentations done by GoSecure researchers☆34Updated 2 years ago
- Notes/Tools for pentesting☆79Updated last year
- Files for appsecwiki.com☆119Updated 5 years ago
- A Cross Site Scripting scanner using selenium webdriver☆54Updated 6 years ago
- ☆79Updated 13 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆106Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆84Updated 4 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- My writeups of various CTFs & security challenges☆73Updated 2 weeks ago
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- Double-Free BUG in WhatsApp exploit poc.☆97Updated 5 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- ☆81Updated 3 years ago
- docker-compose bringing up multiple vulnerable applications inside containers.☆19Updated 7 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- Stego Helper Identification Tool☆27Updated 6 years ago
- A lab to play with authentication and authorisation problems☆98Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆142Updated last year
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A python module that accepts an HTTP request file and returns a dictionary of headers and post data☆44Updated 6 years ago
- Asynchronous wordlist based DKIM scanner☆58Updated 4 years ago
- Dashboard/API + DNS/HTTP Servers to identify Out of Band Resolution in Payloads☆38Updated 4 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- My solutions of CTFs☆67Updated 9 years ago
- ☆64Updated last year
- A cheat sheet for attacking SQLite via SQLi☆101Updated 9 years ago
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆36Updated 8 years ago