GDSSecurity / Anti-CSRF-LibraryLinks
This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CSRF) prevention that is flexible enough to deploy firm-wide within diverse Java/J2EE web application environments.
☆20Updated 8 years ago
Alternatives and similar repositories for Anti-CSRF-Library
Users that are interested in Anti-CSRF-Library are comparing it to the libraries listed below
Sorting:
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- ☆78Updated 6 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆23Updated 11 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Updated 5 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated 2 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Updated 6 years ago
- ☆27Updated 8 years ago
- AntiXSS for Java is a port of the Microsoft Anti-Cross Site Scripting (AntiXSS) v1.5 library for .NET applications. The library requires …☆16Updated 13 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Updated 3 years ago
- Demo Application and Exploit☆35Updated 8 years ago
- ☆30Updated 3 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- ☆11Updated 9 years ago
- ☆73Updated 12 years ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.☆21Updated 6 years ago
- Script to find exploitable magic methods for PHP object injection☆27Updated 11 years ago
- DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olu…☆81Updated 6 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Updated 10 years ago
- Exploits, Fuzzers, Scripts etc☆34Updated 4 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 8 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Updated 11 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 10 years ago
- Tool for introspection of SSL\TLS sessions☆141Updated 2 months ago
- Kippo configured to be a backdoored netscreen☆11Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago