☆10Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Vulnerable-OAuth2.0-Application
Users that are interested in Vulnerable-OAuth2.0-Application are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- "No more counting dollars, we'll be counting stars"☆15Jul 10, 2017Updated 8 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- Arduino MIDI Interface Example Sketches☆11Jan 6, 2022Updated 4 years ago
- A small tool to split .docx files by headings.☆13Jan 30, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆45Jun 23, 2020Updated 5 years ago
- ☆13Oct 24, 2024Updated last year
- CTF writeups☆30May 27, 2022Updated 3 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated last month
- DICOM secuirty☆20Jul 18, 2020Updated 5 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Locally searching in Swift made simple (and fuzzily)☆19Sep 13, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- This repository contains complete source code for setting up the environment and exploit code for the vulnerability.☆19Mar 23, 2023Updated 3 years ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- A list of digital products targeting users across Africa☆16Feb 28, 2021Updated 5 years ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆16Mar 22, 2023Updated 3 years ago
- ☆13Mar 6, 2025Updated last year
- The dataset for the IMC'20 paper titled "Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption"☆13Aug 7, 2022Updated 3 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- ☆16Dec 16, 2021Updated 4 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆328Mar 27, 2024Updated last year
- Personal Notes.☆11Jun 2, 2018Updated 7 years ago
- PhoneFy un simple script para obtener informacion de un telefono☆11Nov 5, 2021Updated 4 years ago
- Analyze Android APK files from a browser.☆15Sep 29, 2020Updated 5 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆67Sep 18, 2021Updated 4 years ago
- A CLI tool to extract, analyze, and filter JavaScript links from web pages or URLs, with regex matching and structured JSON output.☆19Jan 6, 2025Updated last year
- ☆10May 1, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- A simple tool to manipulate window objects in Windows☆45Dec 22, 2016Updated 9 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- ☆14Nov 15, 2020Updated 5 years ago