This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
-
Updated
Feb 10, 2024
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
Jar Analyzer - 一个JAR包分析工具,批量分析,SCA漏洞分析,方法调用关系搜索,字符串搜索,Spring组件分析,信息泄露检查,CFG程序分析,JVM栈帧分析,进阶表达式搜索,字节码指令级的动态调试分析,反编译JAR包一键导出,一键提取序列化数据恶意代码,一键分析BCEL字节码
Web 版 Java Payload 生成与漏洞利用工具,提供 Java 反序列化、Hessian 1/2 反序列化等 Payload 生成,以及 JNDI Exploit、Fake Mysql Exploit、JRMPListener 等相关利用
A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
Vulnerable Web application made with PHP/SQL designed to help new web testers gain some experience and test DAST tools for identifying web vulnerabilities. Containing some of the most well-known vulnerabilities such as SQL, cross-site scripting (XSS), OS command injections, our intention to expand more vulnerabilities for learning purposes.
Praktek Exploitasi celah keamanan website dengan web DVWA (Damn Vulnerable Web Application)
OWASP21-PG is a practical lab that equips enthusiasts, developers & students with skills to identify/prevent web vulnerabilities, particularly in the OWASP Top 10 for 2021. Based on bWAPP, it offers a comprehensive practical lab covering all categories in the OWASP Top 10.
AfterLogic Products Vulnerabilities
Ultimate Cybersecurity and CTF Resource that i gathered over the years
DVWA (Damn Vulnerable Web Application) DVWA is a web application that is intentionally made vulnerable for educational and security testing purposes. It lets users practice and understand different types of web security attacks.
Un petit programme dont le but est de tester la robustesse d'un site contre les attaques de type bruteforce
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
this project is an introduction to web application security
The simplest example of a template injection vulnerability
Praktek eksploitasi celah keamanan OWASP top 10 dengan WebGoat
Google Custom Search Integration: Utilizes Google's Custom Search API to find potentially vulnerable URLs using search dorks. Automated SQL Injection Testing: Automatically checks URLs for common SQL injection vulnerabilities.
Add a description, image, and links to the web-vulnerability topic page so that developers can more easily learn about it.
To associate your repository with the web-vulnerability topic, visit your repo's landing page and select "manage topics."