Build Content-Security-Policy headers from a JSON file (or build them programmatically)
-
Updated
May 8, 2024 - PHP
Build Content-Security-Policy headers from a JSON file (or build them programmatically)
Vulnerable Web application made with PHP/SQL designed to help new web testers gain some experience and test DAST tools for identifying web vulnerabilities. Containing some of the most well-known vulnerabilities such as SQL, cross-site scripting (XSS), OS command injections, our intention to expand more vulnerabilities for learning purposes.
It removes all unwanted HTML elements and attributes, no matter how malformed HTML input you give it. Checks on attribute values. Can be used to avoid Cross-Site Scripting (XSS), Buffer Overflows and Denial of Service attacks, among other things.
arctil vulnerable web application is a sample website built with the purpose of being insecure.
this repository is a docker containing some "XSS vulnerability" challenges and bypass examples.
🌐🔒 Evaluating the security (exploiting and fixing vulnerabilities) of Open eClass 2.3 (University of Athens) platform.
A PHP application which runs on Heroku and dumps web site outputs including JavaScript generated contents.
Explanation of Cross-site Scripting (XSS) with PHP mini project.
A simple web application to learn about Cross-Site Scripting (XSS)
PHP Cookie Stealing Scripts for use in XSS
Secure login authentication and comment prevention from Cross site scripting ,SQL INJECTION , and session hijacking
Add a description, image, and links to the cross-site-scripting topic page so that developers can more easily learn about it.
To associate your repository with the cross-site-scripting topic, visit your repo's landing page and select "manage topics."