Vulnerable Java based Web Application
☆34Jun 24, 2019Updated 6 years ago
Alternatives and similar repositories for VulnerableSpring
Users that are interested in VulnerableSpring are comparing it to the libraries listed below
Sorting:
- Vulnerable Java based Web Application☆271Jun 20, 2024Updated last year
- Hacking and Securing Java☆79Jan 24, 2019Updated 7 years ago
- My Fortify Docker Scripts☆12Mar 12, 2025Updated last year
- Damn Vulnerable Java (EE) Application☆147Jan 23, 2024Updated 2 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity☆21Jul 3, 2024Updated last year
- VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vul…☆51Feb 19, 2026Updated last month
- A vulnerable Play application for attackers.☆18Mar 3, 2026Updated 2 weeks ago
- ☆20Jul 16, 2025Updated 8 months ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- 🐰 Managing command snippets for hackers/bug bounty hunters. with pet.☆106May 6, 2023Updated 2 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Mar 26, 2015Updated 10 years ago
- Vulnerable web application☆81Feb 17, 2026Updated last month
- Repository to showcase various configuration recipes with various technologies☆36Dec 16, 2022Updated 3 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- ☆22Jan 24, 2019Updated 7 years ago
- ☆46May 15, 2016Updated 9 years ago
- Testing tools for Oracle Forms☆45May 27, 2023Updated 2 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- OWASP Findings Format☆19Mar 4, 2021Updated 5 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Aug 6, 2014Updated 11 years ago
- ☆23Apr 8, 2015Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Growing list of potentially dangerous PHP functions☆52May 1, 2019Updated 6 years ago
- ☆13May 12, 2014Updated 11 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- ☆18May 29, 2016Updated 9 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.☆59Mar 2, 2022Updated 4 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆18Nov 6, 2016Updated 9 years ago
- PHP Emulator☆13Dec 18, 2016Updated 9 years ago
- Prometheus adapter to scrape from Kubernetes metrics-server☆21Nov 4, 2019Updated 6 years ago