Skip to content
View root-edzio's full-sized avatar

Block or report root-edzio

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Benchmark Benchmark Public

    Forked from ShiftLeftSecurity/Benchmark

    OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools.

    Java

  2. vulnerable-node vulnerable-node Public

    Forked from cr0hn/vulnerable-node

    A very vulnerable web site written in NodeJS with the purpose of have a project with identified vulnerabilities to test the quality of security analyzers tools tools

    JavaScript

  3. OWASP-VWAD OWASP-VWAD Public

    Forked from OWASP/OWASP-VWAD

    The OWASP Vulnerable Web Applications Directory project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

  4. cve-2017-5638 cve-2017-5638 Public

    Forked from injcristianrojas/cve-2017-5638

    Demo app of THAT data broker's security breach

    Python

  5. struts-rce struts-rce Public

    Forked from ggolawski/struts-rce

    Apache Struts CVE-2017-5638 RCE exploitation

    Java

  6. CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability Public

    Forked from Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability

    Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's content…

    Python