GDSSecurity / JSSE_Fortify_SCA_Rules
Custom Fortify SCA rules to detect common JSSE certification validation flaws
☆11Updated 9 years ago
Alternatives and similar repositories for JSSE_Fortify_SCA_Rules:
Users that are interested in JSSE_Fortify_SCA_Rules are comparing it to the libraries listed below
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- Ruby interface to cirt.net default passwords database☆20Updated 13 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago
- ☆14Updated 6 years ago
- ☆46Updated 8 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆36Updated 7 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- spring mvc cve-2014-3625☆32Updated 9 years ago
- ☆28Updated 7 years ago
- Another plugin for CRLF vulnerability detection☆26Updated 8 years ago
- Flash XSS Scanner☆53Updated 8 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆43Updated last year
- S2-055的环境,基于rest-show-case改造☆37Updated 7 years ago
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆72Updated 10 years ago
- Web scan foundation framework☆23Updated 7 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago
- Struts2 Vuls Scanner base perl script☆22Updated 9 years ago
- Advance URL Fuzzing + Whois Domain running on python☆17Updated 2 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Updated 8 years ago
- Java Untrusted Deserialization Exploits Tools☆66Updated 9 years ago
- ☆18Updated 6 years ago
- DoS PoC's for SAP products☆50Updated 7 years ago
- st2-048☆40Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆41Updated 6 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago