You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# VulnerableFacebookDemo
This is an intentionally vulnerable Java Spring Boot web application that mimics Facebook's login and feed UI. It is designed for SQL injection cybersecurity practice.
## Features
- Facebook-style login page
- Login endpoint vulnerable to SQL injection
- H2 in-memory database with a pre-populated users table
- Simple feed page after login
- Clear code comments highlighting the vulnerability
## Usage
1. Build and run the project with Maven:
```sh
mvn spring-boot:run
```
2. Access the app at http://localhost:8080
3. Try SQL injection on the login page (e.g., username: `admin' --`)
## Warning
**This application is intentionally insecure. Do NOT deploy in production. Use only in isolated, controlled environments for educational purposes.**
# hackable-system