we45 / Vulnerable-Flask-App
Intentionally Vulnerable Flask app for use in Demos
☆32Updated 2 months ago
Alternatives and similar repositories for Vulnerable-Flask-App
Users that are interested in Vulnerable-Flask-App are comparing it to the libraries listed below
Sorting:
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- Route53/CloudFront Vulnerability Assessment Utility☆85Updated last year
- ☆137Updated 2 years ago
- AWS Security Checks☆39Updated 7 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Cloud Security Operations Orchestrator☆184Updated last year
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated last year
- Holds the public Hacking the Cloud CTFs.☆56Updated last year
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆88Updated 2 years ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆166Updated 6 months ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆189Updated 3 years ago
- ☆110Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆125Updated 2 years ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆158Updated 3 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- Dependency Combobulator☆93Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆91Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆142Updated last year