log-snare
Vulnerability simulator
A web application designed to simulate vulnerabilities and demonstrate the importance of proper validation and logging.
LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.
31 stars
1 watching
2 forks
Language: CSS
last commit: 12 months ago Related projects:
Repository | Description | Stars |
---|---|---|
| A Python-based web application honeypot that simulates common web application vulnerabilities to detect and analyze potential threats. | 564 |
| An Android app designed to demonstrate common web application vulnerabilities and provide training in secure coding practices. | 10 |
| An API simulator designed to test and demonstrate common web application security vulnerabilities | 1,187 |
| A tool to demonstrate common vulnerabilities in web applications and provide guidance on fixing them. | 712 |
| An educational project simulating common web app vulnerabilities for teaching security best practices | 186 |
| An educational API project designed to demonstrate various vulnerabilities and security flaws in a web application. | 32 |
| An application that simulates network security scenarios and penetration testing environments to teach security concepts | 579 |
| An open-source web application testing lab designed to simulate various web vulnerabilities. | 396 |
| A penetration testing tool designed to simulate real-world web application vulnerabilities. | 69 |
| A training tool to help security enthusiasts learn web application security vulnerabilities and weaknesses by practicing on a deliberately flawed web application. | 1,700 |
| A tool designed to simulate malicious behavior against Google Workspace environments for threat research and detection rule effectiveness testing | 163 |
| A toolkit for simulating and testing ransomware operations in a controlled environment | 68 |
| A platform for simulating and exploiting smart contract vulnerabilities in a controlled environment | 116 |
| A utility to simulate Windows event logs for testing EDR detections and correlation rules | 836 |
| An interactive workshop to teach exploitation techniques using real-world vulnerabilities in Node.js and Java applications. | 156 |