GDSSecurity / Anti-CSRF-LibraryLinks
This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CSRF) prevention that is flexible enough to deploy firm-wide within diverse Java/J2EE web application environments.
☆20Updated 8 years ago
Alternatives and similar repositories for Anti-CSRF-Library
Users that are interested in Anti-CSRF-Library are comparing it to the libraries listed below
Sorting:
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 9 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆86Updated 8 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Updated 11 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- A minimal Java client for the Nessus XML RPC interface☆23Updated 8 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated 2 years ago
- Serial Whitelist Application Trainer☆29Updated 6 years ago
- ThreadFix is a software vulnerability management platform. This GitHub site is far out of date. Please go to www.threadfix.it for up-to-d…☆341Updated 2 years ago
- Owasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications.☆144Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.☆21Updated 6 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- Tool for introspection of SSL\TLS sessions☆141Updated last week
- Security tools to use on assessments.☆39Updated 9 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- ☆133Updated 9 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Updated 5 years ago
- A malware/botnet analysis framework written in Ruby.☆197Updated 2 years ago
- LNHG - Mass Web Fingerprinter☆62Updated 9 years ago
- ☆128Updated 9 years ago
- ssh key exchange layer for scapy☆13Updated 10 years ago
- A collection of code snippets used in blog posts.☆54Updated last month
- Burp extension that checks for interesting and security headers☆44Updated 5 years ago
- ☆27Updated 8 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- ☆73Updated 12 years ago
- ☆30Updated 3 years ago