☆15Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for vulnerable-spring-boot-application
Users that are interested in vulnerable-spring-boot-application are comparing it to the libraries listed below
Sorting:
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- JAVA Vul Code JAVA常见漏洞与防御代码示例☆10Sep 18, 2018Updated 7 years ago
- Intentionally Vulnerable Node Applications☆16Mar 12, 2020Updated 5 years ago
- Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).☆17Nov 20, 2014Updated 11 years ago
- Demo of a webapp with flawed security, for training purposes☆20Apr 10, 2023Updated 2 years ago
- 扫描常见未授权访问(改)(redis、mongodb、memcached、elasticsearch、zookeeper、ftp、CouchDB、docker、Hadoop)☆15Aug 4, 2020Updated 5 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- Programs for producing static and dynamic (runtime) call graphs for Java programs☆15Aug 23, 2021Updated 4 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Aug 10, 2021Updated 4 years ago
- Open Security Summit 2018☆29Nov 16, 2020Updated 5 years ago
- My Custom made Nuceli-Templates☆22Aug 5, 2025Updated 6 months ago
- Vulnerable webapp testbed☆24May 11, 2016Updated 9 years ago
- POJOs generated from the Static Analysis Results Interchange Format (SARIF) JSON schema.☆27Oct 8, 2025Updated 4 months ago
- Fuzz targets for OSS-Fuzz☆25May 9, 2018Updated 7 years ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Oct 3, 2020Updated 5 years ago
- laravel 5.8 rce pop chain☆26Oct 27, 2019Updated 6 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- A collection of test cases in the Java language. It contains examples for 112 different CWEs.☆62May 17, 2021Updated 4 years ago
- Pretty vulnerable flask app..☆22Oct 30, 2018Updated 7 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- 用于去除 Xshell7 / Xftp7 免费版本在关闭时出现的弹窗。☆10Jan 24, 2023Updated 3 years ago
- MacOS X process monitor using EndpointSecurity extension.☆37Sep 29, 2025Updated 5 months ago
- CVE-2020-2021☆22Oct 12, 2020Updated 5 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- A vulnerable application exposing Spring Boot Actuators☆123Feb 25, 2019Updated 7 years ago
- JSON API's Are Automatically Protected Against CSRF, And Google Almost Took It Away.☆34Jul 9, 2017Updated 8 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- Automated SonarQube☆70Jun 3, 2019Updated 6 years ago
- 通达OA RCE漏洞☆78Mar 18, 2020Updated 5 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- CVE-2019-3799 - Spring Cloud Config Server: Directory Traversal < 2.1.2, 2.0.4, 1.4.6☆31Apr 18, 2019Updated 6 years ago
- 基于tauri+vue的v2ray gui客户端☆10Apr 10, 2024Updated last year
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago