Programs for producing static and dynamic (runtime) call graphs for Java programs
☆15Aug 23, 2021Updated 4 years ago
Alternatives and similar repositories for java-callgraph
Users that are interested in java-callgraph are comparing it to the libraries listed below
Sorting:
- 编译原理学习代码仓库☆23Jan 17, 2022Updated 4 years ago
- ☆16Jan 5, 2021Updated 5 years ago
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 4 years ago
- ☆15Oct 8, 2025Updated 4 months ago
- AppContainerBypass☆21Apr 4, 2021Updated 4 years ago
- 扫描常见未授权访问(改)(redis、mongodb、memcached、elasticsearch、zookeeper、ftp、CouchDB、docker、Hadoop)☆15Aug 4, 2020Updated 5 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Generate all call graph for Java Code.☆551Feb 15, 2026Updated last week
- ☆33Jan 17, 2026Updated last month
- Programs for producing static and dynamic (runtime) call graphs for Java programs☆840Mar 22, 2024Updated last year
- Programs for producing static call graphs for Java programs.☆271Feb 15, 2026Updated last week
- RDI implementation in Nim☆64Dec 12, 2020Updated 5 years ago
- 收集规则☆30Dec 8, 2022Updated 3 years ago
- jre8u20 gadget☆34May 23, 2021Updated 4 years ago
- Add or Delete User via windows api,it can be used when .net is inaccessible.☆39Feb 8, 2020Updated 6 years ago
- The idea plugin to show the tree of dependency to gradle tool☆11Aug 24, 2025Updated 6 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91May 3, 2018Updated 7 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Java Security Documents☆81Sep 19, 2019Updated 6 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Vulcan2.0|分布式扫描器|漏洞扫描|指纹识别☆75Oct 27, 2021Updated 4 years ago
- Java 设计模式梳理☆36Jun 20, 2022Updated 3 years ago
- ☆46Jul 13, 2021Updated 4 years ago
- ☆41Mar 10, 2021Updated 4 years ago
- simple class to extract 1st page from pdf document and create a compressed png file out of it☆10May 20, 2014Updated 11 years ago
- EwoMail是基于Linux的企业邮箱服务器,集成了众多优秀稳定的组件,是一个快速部署、简单高效、多语言、安全稳定的邮件解决方案☆13Nov 25, 2022Updated 3 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- PassKeeper is a Windows utility that allows you to keep an encrypted list of accounts with usernames, passwords, and notes.☆13Dec 29, 2011Updated 14 years ago
- A tool to convert registry values in a .reg file into the script format for Inno Setup.☆11Aug 18, 2020Updated 5 years ago
- zentao Getshell☆10Oct 27, 2020Updated 5 years ago
- Pentest Console - Manage the pentest process with ease. [DEPRECATED]☆18Jan 8, 2012Updated 14 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- TEA cipher in CBC mode written in DRAKON Editor + C as a fun exercise.☆15Jun 6, 2012Updated 13 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago