Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for penetration testing owasp top 10
owasp-top-10
x
penetration-testing
x
10 search results found
Juice Shop
⭐
9,406
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Mutillidae
⭐
1,113
OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an easy-to-use web hacking environment designed for labs, security enthusiasts, classrooms, CTF, and vulnerability assessment tool targets.
Forbidden
⭐
208
Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
Backup Finder
⭐
129
A burp suite extension that reviews backup, old, temporary and unreferenced files on web server for sensitive information (OWASP WSTG-CONF-04, OTG-CONFIG-004)
Vulnplanet
⭐
123
Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)
Admin Panel_finder
⭐
110
A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)
Cve 2022 23808
⭐
110
phpMyAdmin XSS
Vulwebaju
⭐
51
VulWebaju is a platform that automates setting up your pen-testing environment for learning purposes.
Bwapp
⭐
15
bWAPP latest modified for PHP7
Hacking_tools
⭐
11
All Type Of Tools written in multipule language .
Cyberspace
⭐
10
View https://linktr.ee/martian1337 for the Gitbook!!
Appsec Notes
⭐
9
My Application Security Notes - web, mobile, thick client, API, and more.
Ssti Flask Hacking Playground
⭐
7
App with Server Side Template Injection (SSTI) vulnerability - in Flask. For web penetration testing / ethical hacking. Possible RCE :)
Xss_vulnerability_challenges
⭐
5
this repository is a docker containing some "XSS vulnerability" challenges and bypass examples.
Bug Bounty Testing Essential Guideline Startup Bug Hunters
⭐
5
Bug Bounty Testing Essential Guideline : Startup Bug Hunters
Cross Site Scripting
⭐
5
🐞 Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you control of other visitor's browsers.
Talks
⭐
5
BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits
Related Searches
Python Penetration Testing (1,380)
Security Penetration Testing (767)
Shell Penetration Testing (456)
Penetration Testing Security Tools (394)
Scanner Penetration Testing (373)
Penetration Testing Cybersecurity (363)
Exploitation Penetration Testing (344)
1-10 of 10 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.