Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228) and the possible Spring RCE vulnerability.
☆34Mar 31, 2022Updated 3 years ago
Alternatives and similar repositories for spring-rce-vulnerable-app
Users that are interested in spring-rce-vulnerable-app are comparing it to the libraries listed below
Sorting:
- Spring4Shell - Spring Core RCE - CVE-2022-22965☆130Apr 4, 2022Updated 3 years ago
- This is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965).☆106Aug 4, 2022Updated 3 years ago
- ☆86Mar 31, 2022Updated 3 years ago
- try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963☆23Updated this week
- ☆12Feb 24, 2023Updated 3 years ago
- ☆12May 22, 2018Updated 7 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Tools for preservation of floppy disks☆15Nov 22, 2025Updated 3 months ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 5 months ago
- ☆12Dec 23, 2021Updated 4 years ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Feb 25, 2026Updated last week
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Feb 4, 2022Updated 4 years ago
- A deterministic Bloom filter with support for saturation. Suitable for distributed use cases and as a cryptographic primitive.☆18Dec 4, 2023Updated 2 years ago
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆16Jan 4, 2021Updated 5 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- Share your Yara rules with VirusTotal☆27Aug 12, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- CIS Microsoft 365 Foundations Benchmark v5.0.0 - Automated Compliance Checker☆70Updated this week
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Jun 11, 2025Updated 8 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- ☆13May 24, 2023Updated 2 years ago
- My solution for GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Jun 10, 2020Updated 5 years ago
- Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.☆51Mar 24, 2021Updated 4 years ago
- fastjson auto type derivation search☆21Aug 19, 2021Updated 4 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Aug 9, 2018Updated 7 years ago
- Template Injection in Email Templates leads to code execution on Jira Service Management Server☆48Sep 9, 2021Updated 4 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- Unescape strings with escape sequences written out as literal characters.☆26Jan 19, 2026Updated last month
- ☆11Nov 13, 2024Updated last year
- damn-exploitable-android-app-apk☆40Jun 9, 2023Updated 2 years ago
- SecuritySnack data that doesn't fit into a single tweet.☆45Feb 26, 2026Updated last week
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- codeqlpy☆28Jul 6, 2023Updated 2 years ago
- This is the repo of the Flutter Bootcamp by Dev Community Nepal☆14May 25, 2023Updated 2 years ago
- Active Directory Firewall☆98Feb 25, 2026Updated last week