DataDog / vulnerable-java-applicationLinks
This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).
☆19Updated 3 months ago
Alternatives and similar repositories for vulnerable-java-application
Users that are interested in vulnerable-java-application are comparing it to the libraries listed below
Sorting:
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated last month
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 3 months ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 10 months ago
- GCP cloud security CTF☆45Updated last month
- ☆17Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 4 months ago
- WAF bypass PoC☆48Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- ☆47Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 2 years ago
- ☆31Updated 2 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- ☆64Updated last month
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 3 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- ☆35Updated 3 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆23Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated last year
- Tool to spray AWS Console IAM Logins☆29Updated 3 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆11Updated 6 months ago
- Python script to launch burp scans automatically☆32Updated 3 years ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated 10 months ago
- ☆36Updated 4 years ago
- ☆90Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 9 months ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13Updated last year