This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).
☆22Mar 7, 2025Updated 11 months ago
Alternatives and similar repositories for vulnerable-java-application
Users that are interested in vulnerable-java-application are comparing it to the libraries listed below
Sorting:
- Web安全之业务安全实战指南常见功能点总结☆12Aug 12, 2019Updated 6 years ago
- ☆17Jul 12, 2024Updated last year
- Collection of templates (nuclei/jaeles..)☆16Jun 9, 2021Updated 4 years ago
- Nuclei Templates☆14Jan 13, 2023Updated 3 years ago
- 收藏webshell☆25Mar 14, 2022Updated 3 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- 保存有关自己做的 CTF 题目☆18Jun 23, 2019Updated 6 years ago
- 2020 第三届安洵杯 部分题目环境/源码☆17Dec 22, 2020Updated 5 years ago
- 这是一个WebShell收集项目☆23Jul 20, 2016Updated 9 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 4 months ago
- 🐍 The Offensive Python☆20Jun 4, 2021Updated 4 years ago
- Multifunctional open redirection vulnerability scanner.☆30May 6, 2022Updated 3 years ago
- 向日葵RCE漏洞一键批量检测☆30Feb 22, 2022Updated 4 years ago
- SystemGap - Maintenance Tools after privilege escalation☆47Jan 4, 2026Updated last month
- ☆46Nov 7, 2024Updated last year
- A Docker-based development stack for Bedrock WordPress multisite, optimized for local development, source control, and CI/CD integration.☆14Jun 26, 2025Updated 8 months ago
- Convert Confluence MIME exports (.doc) to clean Markdown☆33Jan 13, 2026Updated last month
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- 字节跳动 CTF 2021 线下决赛的一道 Web 题源码,主要考察 SSRF☆43Dec 16, 2021Updated 4 years ago
- A dark retro theme for Zola☆34Dec 29, 2025Updated 2 months ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- Automatically distribute GitHub Actions workflow across repositories.☆12Updated this week
- Docling simplifies document processing, parsing diverse formats — including advanced PDF understanding — and providing seamless integrati…☆17Feb 20, 2026Updated last week
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 8 months ago
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆13Sep 4, 2025Updated 5 months ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- A repository of remark/rehype, Zod, Astro plugins and more☆16Feb 21, 2026Updated last week
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 9 months ago
- Extend wordlist by appending digits and special characters to each word.☆10Apr 26, 2023Updated 2 years ago
- templates for our relays☆12Mar 26, 2018Updated 7 years ago
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆30Jan 18, 2026Updated last month
- Kubernetes logos (쿠버네티스 로고 모음)☆15Dec 27, 2025Updated 2 months ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- Low memory usage random access reader for csv and general files☆14Jun 16, 2022Updated 3 years ago
- This is a WIP. Here be dragons.☆12Jun 28, 2019Updated 6 years ago
- A Python library for efficient and flexible cycle-consistency training of transformer models via iteratie back-translation. Memory and co…☆11Jan 13, 2025Updated last year
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Elis Hirwing's personal website☆11Updated this week
- ☆11Dec 9, 2025Updated 2 months ago