Intentionally Vulnerable Flask app for use in Demos
☆33Feb 7, 2026Updated 2 months ago
Alternatives and similar repositories for Vulnerable-Flask-App
Users that are interested in Vulnerable-Flask-App are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Dec 8, 2022Updated 3 years ago
- Container Security and Serverless Training☆13Dec 8, 2022Updated 3 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Feb 7, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- Simple vulnearable Flask web application☆30Dec 30, 2025Updated 3 months ago
- A collection of tools for every PENTEST engagement☆12Oct 21, 2019Updated 6 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- This project reads data from a csv(MS Excel) file containing numeric data and then stores it into a 2D array in C++;☆10Mar 13, 2017Updated 9 years ago
- CTF writeups☆16Nov 20, 2025Updated 4 months ago
- ☆14Jan 19, 2022Updated 4 years ago
- Code snippets and demo example for other projects☆14Apr 23, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆22Jan 6, 2022Updated 4 years ago
- The Ethereum Improvement Proposal repository☆13Apr 16, 2019Updated 6 years ago
- ☆23Dec 14, 2020Updated 5 years ago
- CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to …☆12Jan 1, 2024Updated 2 years ago
- A simple apache logs analyzer.☆18Oct 1, 2017Updated 8 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆18Dec 28, 2017Updated 8 years ago
- Serverless Workshop☆16Dec 8, 2022Updated 3 years ago
- buffer overflow skeleton scripts, can be used for any TCP based socket flows.☆10Oct 14, 2020Updated 5 years ago
- Port Swigger Labs divided on the based of level and topic.☆14Mar 15, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- OWASP Foundation Web Respository☆20Oct 8, 2025Updated 6 months ago
- Opsec considerations for each AWS GuardDuty finding type.☆24Oct 29, 2020Updated 5 years ago
- A simple dnsmasq web gui.☆17Jul 17, 2023Updated 2 years ago
- A NoSQL Injectable Node App☆42Jun 8, 2021Updated 4 years ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆76Mar 22, 2024Updated 2 years ago
- devops-playground: Pocs and fun with automation and cloud.☆21Apr 7, 2026Updated last week
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…