This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).
☆22Apr 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for vulnerable-java-application
Users that are interested in vulnerable-java-application are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Slides From My Conference Talks☆21Nov 21, 2022Updated 3 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆39Oct 19, 2025Updated 7 months ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Jul 24, 2023Updated 2 years ago
- ☆17Jul 12, 2024Updated last year
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- My Leetcode Problems' Solutions☆11Sep 7, 2023Updated 2 years ago
- Demo all the ways to login to your app using Okta.☆11Dec 7, 2022Updated 3 years ago
- vuln-netframework is a .net-framework 4.7 project that include worst coding practices about common vulnerabilities like Insecure Deserial…☆10Nov 9, 2025Updated 6 months ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- Nuclei Templates☆14Jan 13, 2023Updated 3 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- ☆18Sep 10, 2021Updated 4 years ago
- A tool to automatically transcribe Audible bookmarks for easier export☆12May 7, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PHP Emulator☆13Dec 18, 2016Updated 9 years ago
- OWASP ZSC API http://api.z3r0d4y.com/v2☆10Oct 8, 2016Updated 9 years ago
- templates for our relays☆12Mar 26, 2018Updated 8 years ago
- 收藏webshell☆25Mar 14, 2022Updated 4 years ago
- This is a WIP. Here be dragons.☆12Jun 28, 2019Updated 6 years ago
- Kubernetes logos (쿠버네티스 로고 모음)☆19Apr 29, 2026Updated 2 weeks ago
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Dec 21, 2022Updated 3 years ago
- A vulnerable Play application for attackers.☆18May 4, 2026Updated 2 weeks ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆45Nov 7, 2024Updated last year
- Semantic grep for Ruby code☆15Oct 6, 2011Updated 14 years ago
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 12 years ago
- 保存有关自己做的 CTF 题目☆18Jun 23, 2019Updated 6 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Apr 23, 2021Updated 5 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- 这是一个WebShell收集项目☆23Jul 20, 2016Updated 9 years ago
- 2020 第三届安洵杯 部分题目环境/源码☆17Dec 22, 2020Updated 5 years ago
- Damn Simple Vulnerable Python Web Application☆18Jun 5, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- IIS Configurator for the wonderful Let's Encrypt project☆11Jun 17, 2015Updated 10 years ago
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- PoC: fully unprivileged container escape to node-level code execution on Kubernetes via CVE-2026-31431 page-cache corruption + shared ima…☆133May 7, 2026Updated last week
- Terraform module for AWS WAF implementation.☆15May 17, 2022Updated 4 years ago
- 🐍 The Offensive Python☆20Jun 4, 2021Updated 4 years ago
- Write-ups cho một số bài trên Reversing.kr☆12Mar 24, 2023Updated 3 years ago