☆14Apr 23, 2019Updated 6 years ago
Alternatives and similar repositories for java_security
Users that are interested in java_security are comparing it to the libraries listed below
Sorting:
- ☆33Mar 7, 2026Updated last week
- ☆38Oct 26, 2021Updated 4 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Self-contained jar to lookup timezone by lat+lon☆25Dec 21, 2018Updated 7 years ago
- Memory Webshell for Spring Web - 适用于 Spring Web 的内存马☆26Jan 18, 2024Updated 2 years ago
- Displays a solar terminator on a Leaflet map.☆29Jun 12, 2018Updated 7 years ago
- Learning JAVA for Security☆34Jun 9, 2022Updated 3 years ago
- Spel-research☆26Jun 21, 2022Updated 3 years ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated 2 months ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- use ptrace hook Hotspot JavaVM, instrument java bytecode☆34Sep 28, 2021Updated 4 years ago
- Native Java serialization filter blacklist for common gadgets☆20Sep 12, 2019Updated 6 years ago
- Low-level RASP: Protecting Applications Implemented in High-level Programming Languages☆69Oct 19, 2025Updated 5 months ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Feb 26, 2026Updated 3 weeks ago
- A benchmark to evaluate taint analysis☆29Jun 20, 2022Updated 3 years ago
- Security contract types☆60Oct 4, 2022Updated 3 years ago
- CVE database☆21Sep 2, 2020Updated 5 years ago
- Create Raspberry Pi 3G Hotspot and WLAN-Accesspoint☆16Sep 3, 2015Updated 10 years ago
- ☆101Oct 7, 2023Updated 2 years ago
- Keks Game Console☆18Aug 5, 2023Updated 2 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- Detect burp☆33Jun 7, 2021Updated 4 years ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Horizontal scalability for WebSocket applications☆15Mar 2, 2017Updated 9 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 5 months ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 5 months ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- Dnslog Interactsh的Py版接口查询☆13Dec 10, 2021Updated 4 years ago
- ☆12Sep 27, 2018Updated 7 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- Equal Experts Secure Delivery Playbook☆27Feb 21, 2023Updated 3 years ago