gp-ac-4's repositories
exploit_me
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
AltoroJ
WARNING: This app contains security vulnerabilities. AltoroJ is a sample banking J2EE web application. It shows what happens when web applications are written with consideration of app functionality but not app security. It's a simple and uncluttered platform for demonstrating and learning more about real-life application security issues.
aTortoiseGit
Windows Explorer Extension to Operate Git; Mirror of official repository https://tortoisegit.org/sourcecode
dvcsharp-api
Damn Vulnerable C# Application (API) For Scan Testing
DVID
Damn Vulnerable IoT Device
dvta
Damn Vulnerable Thick Client App developed in C# .NET
DVWA
Damn Vulnerable Web Application (DVWA)
iac-scan-examples
Some basic Infrastructure-as-Code examples to accompany blogs
insecure-deserialisation-net-poc
A small webserver vulnerable to insecure deserialization
nodejs-goof
Super vulnerable todo list application
ObsidianTemplates
template for obsidian
RazorVulnerableApp
DO NOT USE: this is a vulnerable ASP.NET web app using Razor templating engine. The vulnerability is a Server-Side Template Injection (SSTI). For training and testing purposes.
VulnCases
Vulnerability examples.
VulnerableCoreApp
Vulnerable ASP.NET Core 2.0 App
Xcaciv.Command
Modular command framework
Xcaciv.Cupcake
A sweet shell
Xcaciv.Loader
C# module for runtime loading of types
XCBatch
Batch job queue mini
XcExample.Api.Sometext
a project for testing api integration