A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity
☆21Jul 3, 2024Updated last year
Alternatives and similar repositories for VulnerableJavaWebApplication
Users that are interested in VulnerableJavaWebApplication are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- JAVA Vul Code JAVA常见漏洞与防御代码示例☆10Sep 18, 2018Updated 7 years ago
- CVE-2020-13933 靶场: shiro 认证绕过漏洞☆14Apr 9, 2023Updated 3 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Mar 7, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Java反序列化漏洞学习☆14Jul 1, 2021Updated 4 years ago
- A deliberately vulnerable java app for educational purposes☆19Mar 4, 2024Updated 2 years ago
- Vulnerable Java based Web Application☆34Jun 24, 2019Updated 6 years ago
- ☆23Apr 8, 2015Updated 11 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Jul 23, 2019Updated 6 years ago
- Intentionally Vulnerable to Spring4Shell☆52Apr 1, 2022Updated 4 years ago
- Java反序列化漏洞学习笔记☆16Nov 17, 2019Updated 6 years ago
- Evident Security Platform Custom Signatures Samples☆28Apr 17, 2019Updated 6 years ago
- java反序列化漏洞笔记☆24Apr 6, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- java 漏洞平台包含各种CVE☆23Jun 17, 2022Updated 3 years ago
- A server vulnerable to XXE that can be used to test payloads using the xxer tool.☆26Mar 29, 2018Updated 8 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- ☆18Apr 12, 2021Updated 4 years ago
- Demo code for real-time logging processing on GCP☆15May 1, 2024Updated last year
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Forms, emails, and checklists to help with onboarding☆26Sep 6, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Ferramenta de Reconhecimento para Pentest☆48Jul 24, 2021Updated 4 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Sep 6, 2014Updated 11 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- ☆12Nov 22, 2016Updated 9 years ago
- Intentionally Vulnerable Demo App: .NET MVC, WCF, WebAPI, Web Forms☆21Feb 10, 2024Updated 2 years ago
- A set of XSS vulnerable PHP scripts for testing☆39Feb 10, 2013Updated 13 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.☆282Aug 13, 2024Updated last year
- Security audit tool for Django sites☆14Jun 9, 2025Updated 10 months ago
- Jenkins plugin that adds Anchore container image analysis and policy evaluation to Jenkins as a build step☆30Dec 20, 2024Updated last year
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago