Here are
751 public repositories
matching this topic...
Ever been rejected on bug bounty? Well send me your reports to give them a second chance. This includes, but is not limited to - XSS, SQL Injection, Code Execution, Deface, Login Bypass and much more.
Assignments for COSC3371 Cybersecurity taken at the University Of Houston
This repository is a collection of vulnerable code examples for Vert.X.
Updated
May 24, 2024
Java
🎯 List of publicly disclosed application vulnerabilities that I found, reported and were attributed to me.
Application Security Vulnerability Findings, Exploits & OWASP Contributions
Vulnerable Webserver program for Exploitation. Exploits can be found in WEBSERVER_EXPLOIT repository.
All Things Open is the largest "Open" technology event on the east coast.
Old project. A Spring MVC web application with a XML configuration. Vulnerabilities are present.
Updated
Nov 13, 2019
Java
PowerShell Webserver Security Report
Updated
Nov 10, 2020
HTML
A Vulnerability-Exploit desktop finder
Latest trends and updates in Cyber Security. Also how things work in Cyber Security
Updated
Aug 30, 2022
Scala
Aplicación de escritorio para el análisis de proyectos
Updated
Jun 28, 2023
Python
Hi!, this is my blog where I will post all my notes about my everyday learning, thanks for being here.
Updated
Mar 14, 2024
HTML
Updated
Apr 14, 2024
Python
NSE script based on Vulners.com API
Updated
Apr 30, 2023
Python
Improve this page
Add a description, image, and links to the
vulnerabilities
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
vulnerabilities
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.