Contrast-Security-OSS / jinfinity
An API for consuming all the memory of Java apps using deserialization
☆28Updated 9 years ago
Alternatives and similar repositories for jinfinity
Users that are interested in jinfinity are comparing it to the libraries listed below
Sorting:
- Some kernel exploit i wrote☆76Updated 10 years ago
- .NET WPF Framework☆20Updated 8 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- ☆46Updated 9 years ago
- AntiXSS for Java is a port of the Microsoft Anti-Cross Site Scripting (AntiXSS) v1.5 library for .NET applications. The library requires …☆16Updated 12 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- Pivoting framework☆16Updated 8 years ago
- ☆133Updated 9 years ago
- Hackerone disclosed report URL Aggregator☆30Updated 6 years ago
- Peach Fuzzer Web Frontend☆52Updated 3 years ago
- A Swiss Army Knife for Windows Exploit Development.☆40Updated 9 years ago
- SQLChop reverse http proxy module☆32Updated 9 years ago
- Juniper backdoor☆13Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- A malware/botnet analysis framework written in Ruby.☆197Updated last year
- Automatic XSS filter bypass☆89Updated 9 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 7 years ago
- Demo Application and Exploit☆35Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 9 years ago
- ☆78Updated 5 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- ☆15Updated 8 years ago
- IronBee Rules☆18Updated 11 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago