unguard
Vulnerable app
An insecure cloud-native microservices demo application showcasing various vulnerabilities and exploitation techniques
Unguard is an insecure cloud-native microservices demo application.
48 stars
6 watching
22 forks
Language: PHP
last commit: about 1 year ago cloud-nativeexploitskubernetesmicroservicestracing
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A deliberately vulnerable hybrid mobile app used to test and study injection vulnerabilities in Android apps. | 258 |
| | A tool to demonstrate common vulnerabilities in web applications and provide guidance on fixing them. | 712 |
| | An intentionally vulnerable Android application with various exploitable security vulnerabilities. | 217 |
| | An Android app demonstrating various security vulnerabilities and showcasing potential attack vectors | 662 |
| | An application showcasing vulnerabilities in a CICS system | 21 |
| | An insecure web service application used to simulate various web vulnerabilities and demonstrate their mitigation strategies. | 459 |
| | A deliberately vulnerable Django web application showcasing common web application security threats | 230 |
| | A vulnerable Laravel-based API demonstration project showcasing common web application security vulnerabilities. | 392 |
| | A vulnerable Android application designed to demonstrate various security vulnerabilities and educate developers about common Android insecurities. | 1,268 |
| | A Burp Suite Extender to identify Java Deserialization vulnerabilities in client requests and server responses. | 9 |
| | A test application to demonstrate common security vulnerabilities in an Android app | 19 |
| | An intentionally vulnerable Android application used to demonstrate common security risks and vulnerabilities. | 106 |
| | An educational vulnerability-focused Node.js application | 93 |
| | An OWASP vulnerable web application demonstrating various security vulnerabilities using WebSockets | 346 |
| | An SSL-enabled web application used to test web security vulnerabilities and simulate a production environment. | 5 |