DataDog / vulnerable-java-application
This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).
☆16Updated 3 weeks ago
Alternatives and similar repositories for vulnerable-java-application:
Users that are interested in vulnerable-java-application are comparing it to the libraries listed below
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆103Updated 2 months ago
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- ☆31Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 7 months ago
- POC for CVE-2022-23648☆36Updated 3 years ago
- A collection of my Semgrep rules☆48Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆39Updated 3 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 3 weeks ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- ☆30Updated 11 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated 3 weeks ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- ☆26Updated last week
- WAF bypass PoC☆47Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆21Updated 3 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- NotSoCereal: A Deserialization exploit playground☆51Updated 3 years ago
- ☆61Updated 3 months ago
- ☆20Updated 2 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated this week
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago