☆14Apr 23, 2019Updated 6 years ago
Alternatives and similar repositories for java_security
Users that are interested in java_security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆38Oct 26, 2021Updated 4 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Memory Webshell for Spring Web - 适用于 Spring Web 的内存马☆26Jan 18, 2024Updated 2 years ago
- Learning JAVA for Security☆34Jun 9, 2022Updated 3 years ago
- Celestion 是一个无回显漏洞测试辅助平台,平台使用flask编写,提供DNSLOG,HTTPLOG等功能。 (界面懒得弄,后续有需要再说)。☆30Aug 24, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Spel-research☆26Jun 21, 2022Updated 3 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Updated this week
- use ptrace hook Hotspot JavaVM, instrument java bytecode☆32Sep 28, 2021Updated 4 years ago
- ☆17May 16, 2022Updated 3 years ago
- Native Java serialization filter blacklist for common gadgets☆20Sep 12, 2019Updated 6 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Feb 26, 2026Updated last month
- A benchmark to evaluate taint analysis☆29Jun 20, 2022Updated 3 years ago
- Security contract types☆60Oct 4, 2022Updated 3 years ago
- CVE database☆21Sep 2, 2020Updated 5 years ago
- ☆101Oct 7, 2023Updated 2 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- Detect burp☆33Jun 7, 2021Updated 4 years ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 5 months ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 5 months ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- Dnslog Interactsh的Py版接口查询☆13Dec 10, 2021Updated 4 years ago
- Bookmarklet that toggle the numbers of Trello cards.☆11Apr 23, 2020Updated 5 years ago
- ☆12Sep 27, 2018Updated 7 years ago
- sqlmap tamper script for unicode escape inside json