Collection of vulnerable and fixed PHP synthetic test cases
☆66Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for PHP-Vulnerability-test-suite
Users that are interested in PHP-Vulnerability-test-suite are comparing it to the libraries listed below
Sorting:
- ☆11Sep 7, 2023Updated 2 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Parser utility to generate ASTs from PHP source code suitable to be processed by Joern.☆37Apr 21, 2020Updated 5 years ago
- 2018大学生信息安全国赛pwn出题docker☆26Jun 23, 2018Updated 7 years ago
- A static analysis tool for security☆359Aug 17, 2025Updated 6 months ago
- Pixy is a scanner static code analysis tools that scans PHP applications for security vulnerabilities.☆141Jan 5, 2024Updated 2 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- A grey-box web application Fuzzer☆25Aug 16, 2024Updated last year
- ☆43Jan 30, 2023Updated 3 years ago
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- 10 Reset Password Flaws Based on Web Application Security☆11Oct 19, 2020Updated 5 years ago
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 6 months ago
- ☆12Aug 29, 2025Updated 6 months ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆13Oct 3, 2024Updated last year
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆14Jul 24, 2025Updated 7 months ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- ☆14Feb 4, 2020Updated 6 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 6 months ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- ☆18Nov 18, 2020Updated 5 years ago
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- The Z3-Noodler String Solver☆25Feb 27, 2026Updated last week
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- docker env for ios research on a mac host☆28Jun 12, 2025Updated 8 months ago
- A simple exploit to execute system command on codiad☆65Aug 19, 2018Updated 7 years ago
- generate yara-androguard report on your local and scan☆12Oct 3, 2019Updated 6 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- 基于HoneyPy可视化蜜罐,visualization Honeypot based on HoneyPy☆16Mar 23, 2017Updated 8 years ago
- POC MS15-034☆33Apr 28, 2015Updated 10 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago