Vulnerable Java based Web Application
☆34Jun 24, 2019Updated 6 years ago
Alternatives and similar repositories for VulnerableSpring
Users that are interested in VulnerableSpring are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable Java based Web Application☆274Jun 20, 2024Updated last year
- Hacking and Securing Java☆80Jan 24, 2019Updated 7 years ago
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- My Fortify Docker Scripts☆12Mar 12, 2025Updated last year
- Damn Vulnerable Java (EE) Application☆148Jan 23, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆10Feb 18, 2016Updated 10 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity☆21Jul 3, 2024Updated last year
- VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vul…☆54Apr 19, 2026Updated last week
- A vulnerable Play application for attackers.☆18Apr 7, 2026Updated 3 weeks ago
- ☆20Jul 16, 2025Updated 9 months ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆24Dec 7, 2016Updated 9 years ago
- Conference talk slides and code☆11Aug 6, 2020Updated 5 years ago
- 🐰 Managing command snippets for hackers/bug bounty hunters. with pet.☆107May 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Mar 26, 2015Updated 11 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- ☆22Jan 24, 2019Updated 7 years ago
- ☆46May 15, 2016Updated 9 years ago
- Testing tools for Oracle Forms☆45May 27, 2023Updated 2 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- Collect some PoC that I writted .记录自己写过的PoC ..☆22Dec 20, 2017Updated 8 years ago
- OWASP Findings Format☆19Mar 4, 2021Updated 5 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Aug 6, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆23Apr 8, 2015Updated 11 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Growing list of potentially dangerous PHP functions☆52May 1, 2019Updated 6 years ago
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- ☆13May 12, 2014Updated 11 years ago
- vuln-netframework is a .net-framework 4.7 project that include worst coding practices about common vulnerabilities like Insecure Deserial…☆10Nov 9, 2025Updated 5 months ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆18May 29, 2016Updated 9 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.☆60Mar 2, 2022Updated 4 years ago