This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).
☆22Mar 17, 2026Updated 3 weeks ago
Alternatives and similar repositories for vulnerable-java-application
Users that are interested in vulnerable-java-application are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- Web安全之业务安全实战指南常见功能点总结☆12Aug 12, 2019Updated 6 years ago
- Kubernetes Programming with Go by Philippe Martin☆46Oct 23, 2022Updated 3 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 5 months ago
- Kubernetes logos (쿠버네티스 로고 모음)☆15Dec 27, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- ☆17Jul 12, 2024Updated last year
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- IRC-like chat program using POSIX advisory lock covert-channel on time namespaces☆23Nov 12, 2025Updated 4 months ago
- ☆17Sep 10, 2021Updated 4 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- Elixir SDK for the Okta API☆12Sep 30, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- PHP Emulator☆13Dec 18, 2016Updated 9 years ago
- templates for our relays☆12Mar 26, 2018Updated 8 years ago
- This is a WIP. Here be dragons.☆12Jun 28, 2019Updated 6 years ago
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Dec 21, 2022Updated 3 years ago
- A vulnerable Play application for attackers.☆18Mar 27, 2026Updated last week
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- ☆46Nov 7, 2024Updated last year
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 12 years ago
- Semantic grep for Ruby code☆15Oct 6, 2011Updated 14 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Run a task on AWS ECS and stream output☆14Jul 26, 2024Updated last year
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Apr 23, 2021Updated 4 years ago
- 保存有关自己做的 CTF 题目☆18Jun 23, 2019Updated 6 years ago
- 这是一个WebShell收集项目☆23Jul 20, 2016Updated 9 years ago
- Damn Simple Vulnerable Python Web Application☆18Jun 5, 2024Updated last year
- only 5 characters to rce☆15Aug 17, 2022Updated 3 years ago
- IIS Configurator for the wonderful Let's Encrypt project☆11Jun 17, 2015Updated 10 years ago
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Terraform module for AWS WAF implementation.☆15May 17, 2022Updated 3 years ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- A Python library for efficient and flexible cycle-consistency training of transformer models via iteratie back-translation. Memory and co…☆11Jan 13, 2025Updated last year
- Demo Okta SCIM.☆16Feb 2, 2023Updated 3 years ago
- ☆20Updated this week
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago