Contrast-Security-OSS / jinfinityLinks
An API for consuming all the memory of Java apps using deserialization
☆28Updated 10 years ago
Alternatives and similar repositories for jinfinity
Users that are interested in jinfinity are comparing it to the libraries listed below
Sorting:
- Some kernel exploit i wrote☆76Updated 11 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 8 years ago
- ☆132Updated 10 years ago
- .NET WPF Framework☆20Updated 8 years ago
- Hackerone disclosed report URL Aggregator☆30Updated 7 years ago
- A malware/botnet analysis framework written in Ruby.☆195Updated 2 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Juniper backdoor☆14Updated 10 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- A Swiss Army Knife for Windows Exploit Development.☆40Updated 9 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Automatic XSS filter bypass☆90Updated 10 years ago
- Some tools to monitor BillGates CnC servers☆135Updated 11 years ago
- Fuzzbunch Python-Wine wrapper☆56Updated 8 years ago
- ☆77Updated 6 years ago
- Demo Application and Exploit☆35Updated 8 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 10 years ago
- original cve-2013-2094 exploit and a rewritten version for educational purposes☆91Updated 12 years ago
- Exploits and research stuffs☆54Updated this week
- Tainted PhantomJS☆52Updated 10 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 10 years ago
- ☆91Updated 4 years ago
- ☆28Updated 8 years ago
- 一次通过 DNS 来实现部分区域 XSS 防护的简单尝试。☆11Updated 9 years ago
- A php webshell run under linux based webservers. v0.05☆47Updated 10 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Updated 9 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 10 years ago
- IronBee Rules☆18Updated 12 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 8 years ago