we45 / Vulnerable-Flask-App
Intentionally Vulnerable Flask app for use in Demos
☆28Updated last month
Alternatives and similar repositories for Vulnerable-Flask-App:
Users that are interested in Vulnerable-Flask-App are comparing it to the libraries listed below
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Updated 4 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 4 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- Damn Vulnerable Cloud Application☆191Updated 6 years ago
- Holds the public Hacking the Cloud CTFs.☆54Updated 11 months ago
- GCP cloud security CTF☆42Updated 11 months ago
- Jekyll Files for cloudsecwiki.com☆51Updated 3 years ago
- AWS Security Checks☆36Updated 7 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆85Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- ☆133Updated last year
- Fetch the details of assets hosted on AWS.☆86Updated last year
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆90Updated 11 months ago
- ☆10Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆30Updated 2 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Virtual Security Operations Center☆50Updated last year
- Jenkins Security Research☆11Updated 2 months ago
- ☆71Updated 4 years ago
- A Docker container for remote penetration testing.☆134Updated 3 years ago
- ☆109Updated last year
- a vulnerable GraphQL application☆19Updated 5 years ago