Sample exploits of common vulnerabilities in Java librarires
☆27Dec 14, 2023Updated 2 years ago
Alternatives and similar repositories for vulnerability-java-samples
Users that are interested in vulnerability-java-samples are comparing it to the libraries listed below
Sorting:
- Vulnerable Java based Web Application☆270Jun 20, 2024Updated last year
- a repository of all the CTF challenges I've made for public events☆58Jul 30, 2025Updated 7 months ago
- birthday wish to hack font camera☆14Oct 18, 2025Updated 4 months ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Mar 2, 2019Updated 7 years ago
- Common Security Interview Questions with Answers☆31Jul 4, 2023Updated 2 years ago
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagr…☆41Jun 20, 2025Updated 8 months ago
- A deliberately insecure Java web application☆44Oct 23, 2025Updated 4 months ago
- Projects made in C and C++.☆10May 29, 2021Updated 4 years ago
- A GUI based face recognizer coded in Python☆12Dec 19, 2019Updated 6 years ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Code and files specific to the AWS Certified Security - Specialty Exam Prep course☆10Jan 16, 2024Updated 2 years ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Mar 20, 2017Updated 8 years ago
- Preparation for OSWE☆47Apr 19, 2020Updated 5 years ago
- This repository contains all the examples related to a series of tutorials that demonstrate how to use the new Montoya API of Burp Suite …☆47Dec 10, 2025Updated 2 months ago
- learning case to prepare OSWE☆36Nov 4, 2019Updated 6 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Jan 31, 2025Updated last year
- In this article, we will see how to secure a spring-boot 2 application using keycloak. I will be using the `keycloak-spring-boot-2-adapte…☆10Aug 1, 2024Updated last year
- ☆12Apr 20, 2025Updated 10 months ago
- ☆10May 6, 2017Updated 8 years ago
- ☆11Oct 2, 2025Updated 4 months ago
- A repo of Java examples using Apache Flink with flink-connector-kafka☆10Oct 5, 2022Updated 3 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 2 weeks ago
- JS lib to create responsive gauges, based on D3 and SVG.☆11May 31, 2019Updated 6 years ago
- ☆16Jun 21, 2024Updated last year
- ☆16Sep 6, 2017Updated 8 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- Java Web shell project☆12Oct 22, 2021Updated 4 years ago
- lots of fun not working to get supporting infrastructure☆11May 25, 2019Updated 6 years ago
- you idiots☆11Oct 30, 2024Updated last year
- React ToDo App☆12Mar 5, 2023Updated 2 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago