This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).
☆22Mar 6, 2026Updated 2 weeks ago
Alternatives and similar repositories for vulnerable-java-application
Users that are interested in vulnerable-java-application are comparing it to the libraries listed below
Sorting:
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- ☆20Jan 30, 2026Updated last month
- Kubernetes Programming with Go by Philippe Martin☆46Oct 23, 2022Updated 3 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Kubernetes logos (쿠버네티스 로고 모음)☆15Dec 27, 2025Updated 2 months ago
- ☆17Jul 12, 2024Updated last year
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- Secure Coding Checklist for Developers☆21Mar 6, 2023Updated 3 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Nuclei Templates☆14Jan 13, 2023Updated 3 years ago
- IRC-like chat program using POSIX advisory lock covert-channel on time namespaces☆23Nov 12, 2025Updated 4 months ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- templates for our relays☆12Mar 26, 2018Updated 7 years ago
- A vulnerable Play application for attackers.☆18Mar 3, 2026Updated 2 weeks ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- whois.cynthia.re V2☆13May 23, 2021Updated 4 years ago
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Dec 21, 2022Updated 3 years ago
- a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.☆18Sep 12, 2024Updated last year
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59May 20, 2025Updated 10 months ago
- WolvCtf-2023-Challenges-Public☆12Apr 13, 2023Updated 2 years ago
- ☆46Nov 7, 2024Updated last year
- Secure Coding in Python☆22Oct 11, 2024Updated last year
- Semantic grep for Ruby code☆15Oct 6, 2011Updated 14 years ago
- Run a task on AWS ECS and stream output☆15Jul 26, 2024Updated last year
- Elis Hirwing's personal website☆11Updated this week
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- ☆25Jul 2, 2024Updated last year
- 这是一个WebShell收集项目☆23Jul 20, 2016Updated 9 years ago
- 2020 第三届安洵杯 部分题目环境/源码☆17Dec 22, 2020Updated 5 years ago
- Damn Simple Vulnerable Python Web Application☆18Jun 5, 2024Updated last year
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- only 5 characters to rce☆15Aug 17, 2022Updated 3 years ago
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- A nix language configuration framework based on POP: Pure Object Prototypes☆13Updated this week
- Terraform module for AWS WAF implementation.☆15May 17, 2022Updated 3 years ago