This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
-
Updated
Aug 21, 2023 - PHP
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
ε½ε ηζζζεΈ¦δ½ η¨ SSRF ζη©Ώε η½ιΆεΊζΊη
WebHook for Red Team
Server-Side Request Forgery (SSRF) protection plugin for HTTPlug
Intentionally vulnerable healthcare patient portal demonstrating all OWASP Top 10 (2021) vulnerabilities with real-time toggling between exploitable and hardened code paths. Built with raw PHP, MySQL, and Apache.
π An interactive PHP-based learning platform demonstrating common web security vulnerabilities (XSS, SQLi, CSRF, etc.) and their secure implementations. Perfect for security education and penetration testing practice.
BlackCat Core β Web3-backed TrustKernel security: HTTPS-only request hardening, fail-closed runtime config, and guarded DB/crypto entrypoints.
Pikachu enhanced Web security lab with JWT, CORS, Clickjacking, Session Fixation, Host Header and Docker Lab.
Add a description, image, and links to the ssrf topic page so that developers can more easily learn about it.
To associate your repository with the ssrf topic, visit your repo's landing page and select "manage topics."