Cisco-AMP / java_securityLinks
☆14Updated 6 years ago
Alternatives and similar repositories for java_security
Users that are interested in java_security are comparing it to the libraries listed below
Sorting:
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Updated 7 years ago
- XSS payloads for edge cases☆34Updated 7 years ago
- A static analysis API for finding deserialization attack gadgets☆38Updated 3 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 7 years ago
- ☆33Updated 4 years ago
- Burp Suite AMF Extension☆48Updated 7 years ago
- Full TTY reverse shell over SSH☆59Updated 5 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- siberas JMX exploitation toolkit☆130Updated 2 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Updated 8 years ago
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Updated 6 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- ☆34Updated 6 years ago
- A tool to analyse JMX API security level.☆43Updated 11 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆108Updated 9 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- CORS checking☆34Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Updated 6 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Updated 2 weeks ago
- Burp extension☆58Updated 7 years ago
- Study about HQL injection exploitation.☆51Updated 9 years ago
- ☆43Updated 5 years ago
- miscellaneous security research stuff☆37Updated 6 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆67Updated 5 years ago
- ☆63Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Updated 7 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Updated 9 years ago
- Scans tcl for command injection☆36Updated 6 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Updated 6 years ago