A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity
☆21Jul 3, 2024Updated last year
Alternatives and similar repositories for VulnerableJavaWebApplication
Users that are interested in VulnerableJavaWebApplication are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- JAVA Vul Code JAVA常见漏洞与防御代码示例☆10Sep 18, 2018Updated 7 years ago
- CVE-2020-13933 靶场: shiro 认证绕过漏洞☆14Apr 9, 2023Updated 3 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Mar 7, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Java反序列化漏洞学习☆14Jul 1, 2021Updated 4 years ago
- A deliberately vulnerable java app for educational purposes☆19Mar 4, 2024Updated 2 years ago
- Vulnerable Java based Web Application☆34Jun 24, 2019Updated 6 years ago
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- ☆23Apr 8, 2015Updated 11 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Jul 23, 2019Updated 6 years ago
- Intentionally Vulnerable to Spring4Shell☆52Apr 1, 2022Updated 4 years ago
- Java反序列化漏洞学习笔记☆16Nov 17, 2019Updated 6 years ago
- Evident Security Platform Custom Signatures Samples☆28Apr 17, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- java反序列化漏洞笔记☆24Apr 6, 2019Updated 7 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- java 漏洞平台包含各种CVE☆23Jun 17, 2022Updated 3 years ago
- Ease the pain of resourcing an API Gateway method.☆14Jan 12, 2017Updated 9 years ago
- A server vulnerable to XXE that can be used to test payloads using the xxer tool.☆26Mar 29, 2018Updated 8 years ago
- Vulnerable Java based Web Application☆275May 10, 2026Updated last week
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Forms, emails, and checklists to help with onboarding☆26Sep 6, 2018Updated 7 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Sep 6, 2014Updated 11 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- Intentionally Vulnerable Demo App: .NET MVC, WCF, WebAPI, Web Forms☆21Feb 10, 2024Updated 2 years ago
- A set of XSS vulnerable PHP scripts for testing☆39Feb 10, 2013Updated 13 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.☆286Aug 13, 2024Updated last year
- Security audit tool for Django sites☆14Jun 9, 2025Updated 11 months ago
- Jenkins plugin that adds Anchore container image analysis and policy evaluation to Jenkins as a build step☆30Dec 20, 2024Updated last year
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago
- Quick Repo for any Bug Hunter☆15May 19, 2021Updated 5 years ago
- Threat Specification Language☆28Oct 6, 2015Updated 10 years ago