Contrast-Security-OSS / jinfinity
An API for consuming all the memory of Java apps using deserialization
☆28Updated 9 years ago
Alternatives and similar repositories for jinfinity:
Users that are interested in jinfinity are comparing it to the libraries listed below
- Some kernel exploit i wrote☆77Updated 10 years ago
- .NET WPF Framework☆20Updated 8 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- ☆132Updated 9 years ago
- ☆46Updated 8 years ago
- Jboss 反序列化支持回显EXP 源码☆7Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- SQLChop reverse http proxy module☆32Updated 9 years ago
- AntiXSS for Java is a port of the Microsoft Anti-Cross Site Scripting (AntiXSS) v1.5 library for .NET applications. The library requires …☆16Updated 12 years ago
- Automatic XSS filter bypass☆89Updated 9 years ago
- IronBee Rules☆19Updated 11 years ago
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- ☆78Updated 5 years ago
- ☆17Updated 7 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- Juniper backdoor☆13Updated 9 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Peach Fuzzer Web Frontend☆52Updated 3 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- A malware/botnet analysis framework written in Ruby.☆197Updated last year
- Hackerone disclosed report URL Aggregator☆29Updated 6 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- Demo Application and Exploit☆35Updated 8 years ago
- ☆15Updated 8 years ago
- Flash XSS Scanner☆53Updated 8 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- PoC for Scala and Groovy☆14Updated 9 years ago