koenbuyens/Vulnerable-OAuth-2.0-Applications
vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.
JavaScript
Stargazers
- 0xno0neknows
- 6t2United States
- alexlauermanTrustFoundry
- alexxn
- amanvir
- backcover7@salesforce
- Bl4ck4
- boh
- cmarmulla@carmasec
- devanshbathamIndia
- griffithtpLondon
- GuruShivaFrom one binary to another
- jalsuwailem
- khaledgedo
- kmcquadeNightVision Security
- kochetkovRussia, Rostov-on-Don
- LewisArdern
- Locour
- m8r1us
- michaellcaderSan Francisco
- nav7neeetIndia
- pranav1hivarekar
- R3zk0nMelbourne
- RapidDNSNew York
- Ressurect0India
- ryanbaxendale@CenturionInfoSec
- samshenoy26
- scottjIn Transit
- security-princeIndia
- shad0whack
- Siegelcppuniversity centre of the westfjords
- skozzii
- subzer0x0India
- VincentDSBelgium
- w1tch3rr
- xElkomyCO-Founder of @Cyber-Ar