DataDog / vulnerable-java-applicationLinks
This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).
☆22Updated 7 months ago
Alternatives and similar repositories for vulnerable-java-application
Users that are interested in vulnerable-java-application are comparing it to the libraries listed below
Sorting:
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 9 months ago
 - ☆126Updated last year
 - ☆204Updated 11 months ago
 - Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆138Updated this week
 - Cloud agnostic IAM permissions enumerator☆156Updated 6 months ago
 - Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
 - An extension to use Semgrep inside Burp Suite.☆89Updated 5 months ago
 - GCP GOAT is the vulnerable application for learn the GCP Security☆68Updated 5 months ago
 - Damn Vulnerable Cloud Application☆199Updated 7 years ago
 - The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆231Updated 3 years ago
 - Tools to assess DNS security.☆153Updated last year
 - ☆114Updated 2 years ago
 - A utility to convert your AWS CLI credentials into AWS console access.☆247Updated 5 years ago
 - boostsecurityio/lotp☆136Updated last week
 - Find authentication (authn) and authorization (authz) security bugs in web application routes.☆280Updated last month
 - Scan DockerHub images that match a keyword to find secrets.☆60Updated 4 years ago
 - Find CVE PoCs on GitHub☆154Updated 3 months ago
 - Purposely vulnerable Java application to help lead secure coding workshops☆189Updated last year
 - Damn Vulnerable Java (EE) Application☆142Updated last year
 - Proof of concept code for Datadog Security Labs referenced exploits.☆443Updated 2 months ago
 - A GraphQL enumeration and extraction tool☆133Updated 2 years ago
 - Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆192Updated 11 months ago
 - Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆278Updated 2 months ago
 - FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆163Updated this week
 - A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last year
 - PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.☆45Updated 2 months ago
 - Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆122Updated 3 months ago
 - Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆174Updated last year
 - Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 4 years ago
 - Damn Vulnerable SCA Application☆42Updated 2 weeks ago