This is a vulnerable web application developed by Cyber Security and Privacy Foundation for Java programmers and individuals interested in learning about web application vulnerabilities. The full course content is available on GitHub for free at https://github.com/CSPF-Founder/JavaSecurityCourse. It is recommended to run this app in a virtual machine due to its vulnerabilities. The easiest way to set it up is by using Docker with a single command line.
FEATURES
SIMILAR TOOLS
A collection of computer science courses with video lectures covering a wide range of topics.
A collection of reports and resources highlighting Android security vulnerabilities and best practices.
Comprehensive reference guide for bug bounty hunters with detailed information on various vulnerabilities, platforms, tools, and best practices.
Comprehensive documentation for ThreatConnect's REST API and SDKs.
A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.
A newsletter service that tracks and reports weekly changes in detection engineering rules and updates across multiple GitHub repositories.
A documentation template library for implementing industrial information security management systems.
The SOC Academy offers official VirusTotal certification courses to help cybersecurity professionals maximize its functionalities and advance their careers.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.