Vulnerable SAML infrastructure training applicaiton
☆54Feb 2, 2023Updated 3 years ago
Alternatives and similar repositories for VulnerableSAMLApp
Users that are interested in VulnerableSAMLApp are comparing it to the libraries listed below
Sorting:
- Practice hacking JWT tokens☆115Sep 8, 2022Updated 3 years ago
- GraphQL security workshop labs☆117Jan 31, 2026Updated last month
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆328Mar 27, 2024Updated last year
- ☆15Sep 11, 2020Updated 5 years ago
- Vulnerable demo application for the race condition☆22Apr 27, 2021Updated 4 years ago
- Basic implementation of certstream to print new subdomains and domains☆36Jul 6, 2021Updated 4 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- Same Origin XSS challenge☆64Apr 7, 2022Updated 3 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- ☆44Apr 30, 2021Updated 4 years ago
- ☆31Aug 25, 2023Updated 2 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- Custom scripts for the PIPER Burp extensions.☆97Sep 24, 2023Updated 2 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago
- An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentes…☆225Aug 26, 2021Updated 4 years ago
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last week
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- Go scripts for checking API key / access token validity☆221Aug 3, 2021Updated 4 years ago
- Hidden parameters discovery suite☆224Nov 14, 2022Updated 3 years ago
- List HackerOne private program assets☆154Jun 24, 2021Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- JSON CSRF PoC☆14Aug 1, 2020Updated 5 years ago
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆256Mar 2, 2022Updated 4 years ago
- Cracked version of LockBit Ransomware Including the missing Locker files. Including source code.☆19Sep 21, 2023Updated 2 years ago
- The project aims at creating target-specific wordlists for any web application that you are testing.☆66May 28, 2022Updated 3 years ago
- Prototype Pollution Lab☆19Nov 20, 2020Updated 5 years ago
- Fork of Google Gruyere for security testing and education. ⚠️ This is a vulnerable app by design.☆17Jul 2, 2023Updated 2 years ago
- weblogic wls9-async 反序列利用图形版客户端 CNVD-C-2019-48814☆13May 9, 2019Updated 6 years ago
- This repo will contain some basic pentest/RT commands.☆37Jun 2, 2022Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆76May 9, 2023Updated 2 years ago
- A repository of some useful grep patterns for tomnomnoms gf tool☆38Oct 11, 2020Updated 5 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago