Contrast-Security-OSS / jinfinityLinks
An API for consuming all the memory of Java apps using deserialization
☆28Updated 9 years ago
Alternatives and similar repositories for jinfinity
Users that are interested in jinfinity are comparing it to the libraries listed below
Sorting:
- ☆133Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- AntiXSS for Java is a port of the Microsoft Anti-Cross Site Scripting (AntiXSS) v1.5 library for .NET applications. The library requires …☆16Updated 12 years ago
- .NET WPF Framework☆20Updated 8 years ago
- ☆46Updated 9 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- Jboss 反序列化支持回显EXP 源码☆7Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- Automatic XSS filter bypass☆90Updated 9 years ago
- Demo Application and Exploit☆35Updated 8 years ago
- A Swiss Army Knife for Windows Exploit Development.☆40Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- An open source XSS vulnerability scanner.☆61Updated 6 years ago
- ☆28Updated 7 years ago
- SQLChop reverse http proxy module☆32Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- Some kernel exploit i wrote☆76Updated 10 years ago
- ☆78Updated 5 years ago
- IronBee Rules☆18Updated 11 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- PoC for Scala and Groovy☆14Updated 9 years ago
- Peach Fuzzer Web Frontend☆52Updated 3 years ago
- ERPScan Public POC for CVE-2018-2636☆22Updated 7 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 7 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆55Updated 8 years ago
- Hackerone disclosed report URL Aggregator☆30Updated 6 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- java unserialize vulnerability payload☆21Updated 6 years ago
- 投诉太狠啊,换个地方自己下吧☆14Updated 8 years ago