 lambhack
 lambhack 
 Vulnerability demo
 A vulnerable serverless application in AWS Lambda demonstrating various security vulnerabilities
A very vulnerable serverless application in AWS Lambda
94 stars
 9 watching
 27 forks
 
Language: Go 
last commit: about 6 years ago 
Linked from   1 awesome list  
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | A simple serverless application designed to create and monitor fake HTTP endpoints for security testing | 511 | 
|  | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 681 | 
|  | An Android application showcasing various security vulnerabilities to demonstrate potential attack vectors | 62 | 
|  | Automates vulnerability scanning and reporting by integrating multiple scanners into a unified platform | 1,362 | 
|  | Scans URLs from the wayback machine and tests GET parameters for SQL injection vulnerabilities. | 187 | 
|  | A set of tools and scripts for testing and demonstrating cloud security vulnerabilities in AWS environments. | 31 | 
|  | An application showcasing vulnerabilities in a CICS system | 21 | 
|  | A collection of tools and methodologies for identifying vulnerabilities in web applications | 3,698 | 
|  | A deliberately vulnerable Java application demonstrating common serverless security flaws | 12 | 
|  | An IDA PRO plugin to analyze binaries for potential vulnerabilities using AI-powered decompilation and static analysis | 353 | 
|  | A proof-of-concept demonstrating the vulnerability of unsecured containers to privilege escalation attacks | 12 | 
|  | A proof-of-concept demonstration of common serverless security flaws and weaknesses | 320 | 
|  | A toolset providing vulnerable cloud infrastructure as code to analyze and secure infrastructure-as-code threats | 96 | 
|  | A deliberately vulnerable web application designed to demonstrate common web application security vulnerabilities for educational purposes. | 264 | 
|  | A proof-of-concept web application demonstrating an XML External Entity vulnerability | 225 |