Contrast-Security-OSS / jinfinity
An API for consuming all the memory of Java apps using deserialization
☆28Updated 9 years ago
Alternatives and similar repositories for jinfinity:
Users that are interested in jinfinity are comparing it to the libraries listed below
- .NET WPF Framework☆20Updated 8 years ago
- Some kernel exploit i wrote☆77Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- A malware/botnet analysis framework written in Ruby.☆197Updated last year
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- AntiXSS for Java is a port of the Microsoft Anti-Cross Site Scripting (AntiXSS) v1.5 library for .NET applications. The library requires …☆16Updated 12 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago
- ☆132Updated 9 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Peach Fuzzer Web Frontend☆52Updated 3 years ago
- A Swiss Army Knife for Windows Exploit Development.☆41Updated 8 years ago
- ☆46Updated 8 years ago
- Some tools to monitor BillGates CnC servers☆134Updated 10 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- Demo Application and Exploit☆35Updated 8 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 7 years ago
- Juniper backdoor☆13Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Pivoting framework☆16Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 9 years ago
- Jboss 反序列化支持回显EXP 源码☆7Updated 9 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Updated 6 years ago
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆42Updated 8 years ago
- The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Scala and Groovy projects)☆21Updated last year
- Java Untrusted Deserialization Exploits Tools☆66Updated 9 years ago
- ☆28Updated 7 years ago