DataDog / vulnerable-java-applicationLinks
This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).
☆20Updated 6 months ago
Alternatives and similar repositories for vulnerable-java-application
Users that are interested in vulnerable-java-application are comparing it to the libraries listed below
Sorting:
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 7 months ago
- ☆199Updated 10 months ago
- Find CVE PoCs on GitHub☆151Updated last month
- ☆127Updated last year
- Damn Vulnerable Cloud Application☆198Updated 6 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆136Updated 5 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated last week
- An extension to use Semgrep inside Burp Suite.☆89Updated 3 months ago
- boostsecurityio/lotp☆132Updated 4 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆185Updated last year
- A utility to convert your AWS CLI credentials into AWS console access.☆241Updated 5 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- ☆112Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆443Updated 2 weeks ago
- Cloud agnostic IAM permissions enumerator☆156Updated 4 months ago
- Damn Vulnerable Java (EE) Application☆141Updated last year
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆122Updated last month
- GCP GOAT is the vulnerable application for learn the GCP Security☆66Updated 3 months ago
- Tools to assess DNS security.☆152Updated last year
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆222Updated 3 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆191Updated 9 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆108Updated last year
- GCP cloud security CTF☆47Updated 2 months ago
- Workshop given at Hack in Paris 2019☆123Updated 2 years ago
- ☆50Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆87Updated last year
- OWASP Foundation Web Respository☆37Updated last year
- ☆116Updated 2 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated 11 months ago