Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

DarkJustioe/Hello-Java-Sec

Open more actions menu
 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

☕️ Hello Java Sec Stage

Java漏洞平台,结合漏洞代码和安全编码,帮助研发同学理解和减少漏洞,代码仅供参考

  • 默认账号:admin/admin

Vulnerability

  • SQLi
  • XSS
  • RCE
  • Deserialize
  • SSTI
  • SpEL
  • SSRF
  • Directory Traversal
  • Redirect
  • CSRF
  • File Upload
  • XXE
  • Actuator
  • Fastjson
  • Xstream
  • Log4shell
  • JNDI
  • Dos
  • more

Run

IDEA

配置数据库连接,数据库文件db.sql

spring.datasource.url=jdbc:mysql://127.0.0.1:3306/test
spring.datasource.username=root
spring.datasource.password=1234567

Jar

git clone https://github.com/j3ers3/Hello-Java-Sec
cd Hello-Java-Sec
mvn clean package -DskipTests
java -jar target/hello-1.0.0-SNAPSHOT.jar

Docker

bash deploy.sh

技术架构

  • Java 1.8
  • SpringBoot 4.0
  • Bootstrap 4.6.0
  • Codemirror 5.62.0

About

☕️ Java Security,安全编码和代码审计

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages

  • Java 75.9%
  • HTML 19.5%
  • CSS 4.6%
Morty Proxy This is a proxified and sanitized view of the page, visit original site.