A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity
☆21Jul 3, 2024Updated last year
Alternatives and similar repositories for VulnerableJavaWebApplication
Users that are interested in VulnerableJavaWebApplication are comparing it to the libraries listed below
Sorting:
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- JAVA Vul Code JAVA常见漏洞与防御代码示例☆10Sep 18, 2018Updated 7 years ago
- CVE-2020-13933 靶场: shiro 认证绕过漏洞☆14Apr 9, 2023Updated 2 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Mar 7, 2024Updated 2 years ago
- Java反序列化漏洞学习☆14Jul 1, 2021Updated 4 years ago
- A deliberately vulnerable java app for educational purposes☆19Mar 4, 2024Updated 2 years ago
- Vulnerable Java based Web Application☆34Jun 24, 2019Updated 6 years ago
- Automated security testing framework for web applications☆21Jun 28, 2023Updated 2 years ago
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- ☆23Apr 8, 2015Updated 10 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Jul 23, 2019Updated 6 years ago
- Evident Security Platform Custom Signatures Samples☆28Apr 17, 2019Updated 6 years ago
- java反序列化漏洞笔记☆24Apr 6, 2019Updated 6 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- java 漏洞平台包含各种CVE☆23Jun 17, 2022Updated 3 years ago
- A server vulnerable to XXE that can be used to test payloads using the xxer tool.☆26Mar 29, 2018Updated 7 years ago
- ☆18Apr 12, 2021Updated 4 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Forms, emails, and checklists to help with onboarding☆26Sep 6, 2018Updated 7 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- Ferramenta de Reconhecimento para Pentest☆48Jul 24, 2021Updated 4 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Sep 6, 2014Updated 11 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- ☆12Nov 22, 2016Updated 9 years ago
- A set of XSS vulnerable PHP scripts for testing☆39Feb 10, 2013Updated 13 years ago
- Intentionally Vulnerable Demo App: .NET MVC, WCF, WebAPI, Web Forms☆21Feb 10, 2024Updated 2 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.☆281Aug 13, 2024Updated last year
- Security audit tool for Django sites☆14Jun 9, 2025Updated 9 months ago
- Jenkins plugin that adds Anchore container image analysis and policy evaluation to Jenkins as a build step☆30Dec 20, 2024Updated last year
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 8 years ago
- Threat Specification Language☆28Oct 6, 2015Updated 10 years ago
- WEB 跨域postMessage() 漏洞挖掘工具,基本原理:使用AJAX 获取页面代码,结合iframe 和data 协议构造测试环境,然后在iframe 下的window.onmessage 中插入hook 监控onmessage 的参数,最后通过能否被原来的onme…☆11Sep 13, 2016Updated 9 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 11 months ago