A deliberately vulnerable java app for educational purposes
☆19Mar 4, 2024Updated 2 years ago
Alternatives and similar repositories for javulna
Users that are interested in javulna are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Purposely-vulnerable Python functions☆17Oct 8, 2025Updated 5 months ago
- A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity☆21Jul 3, 2024Updated last year
- (aka Kotlin Goat) - an intentionally vulnerable Kotlin application☆36Apr 17, 2024Updated last year
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 7 months ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- PHP Emulator☆13Dec 18, 2016Updated 9 years ago
- findings and helper around ceph☆14Jul 30, 2025Updated 7 months ago
- A vulnerable Play application for attackers.☆18Mar 3, 2026Updated 3 weeks ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- whois.cynthia.re V2☆13May 23, 2021Updated 4 years ago
- CVE-2023-22894☆13Apr 24, 2023Updated 2 years ago
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 11 years ago
- Run a task on AWS ECS and stream output☆15Jul 26, 2024Updated last year
- ☆15Feb 19, 2024Updated 2 years ago
- Damn Simple Vulnerable Python Web Application☆18Jun 5, 2024Updated last year
- Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆71Aug 14, 2024Updated last year
- ☆12Oct 9, 2023Updated 2 years ago
- Datadog APM Plugin for Kong Gateway☆19Updated this week
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Converts JSON to CSV. Powers the online tool CSVJSON.☆18Mar 29, 2021Updated 4 years ago
- VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vul…☆51Mar 16, 2026Updated last week
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Mar 26, 2015Updated 10 years ago
- This project demonstrates how a third party solution, like Datadog, can be used to monitor a Kubernetes Engine cluster and its workloads.…☆24Dec 14, 2023Updated 2 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆86Mar 3, 2023Updated 3 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- flask-webgoat is a deliberately-vulnerable application written with the Flask web framework.☆19Sep 5, 2025Updated 6 months ago
- ☆28Aug 7, 2024Updated last year
- Master password for openSSH service☆16May 30, 2019Updated 6 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- ☆21Mar 7, 2024Updated 2 years ago
- All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.☆47Dec 28, 2025Updated 2 months ago
- ☆37Apr 23, 2024Updated last year
- StackStorm Dockerfiles (one-service-per-container) to build and push images to the StackStorm Docker registry. Used by stackstorm-ha K8s …☆24Jan 8, 2026Updated 2 months ago
- In this Course we gonna learn tailwind CSS.☆19Jul 23, 2021Updated 4 years ago