DataDog / vulnerable-java-application
This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).
☆19Updated 2 months ago
Alternatives and similar repositories for vulnerable-java-application
Users that are interested in vulnerable-java-application are comparing it to the libraries listed below
Sorting:
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆104Updated 3 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- WAF bypass PoC☆47Updated last year
- ☆31Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆31Updated 2 months ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- ☆47Updated 11 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- ☆36Updated 4 years ago
- GCP cloud security CTF☆44Updated last week
- A Terraform reproducer for IngressNightmare☆25Updated last month
- A collection of my Semgrep rules☆49Updated last year
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 7 months ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 4 months ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated last month
- ☆17Updated 2 years ago
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- A curated list of argument injection vectors☆41Updated 3 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- ☆90Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 3 months ago
- ☆126Updated 10 months ago