corda / djvmLinks
Deterministic Sandbox for the JVM
☆27Updated 2 years ago
Alternatives and similar repositories for djvm
Users that are interested in djvm are comparing it to the libraries listed below
Sorting:
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆191Updated 9 years ago
- Non-interactive Java debugger with Groovy☆80Updated last year
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110Updated 9 years ago
- ☆153Updated 6 years ago
- DolphinChain is the first Vulnerable Blockchain Application in the world!☆16Updated 6 years ago
- A static analysis API for finding deserialization attack gadgets☆38Updated 3 years ago
- NoneAge Blockchain Security Tutorial☆42Updated 6 years ago
- This repo contains the files required to perform a CSRF attack using Flash and HTTP 307 redirections.☆77Updated 8 years ago
- Generate CodeQL taint-tracking models for Go (along with tests) in a graphical UI☆20Updated 2 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 6 years ago
- ☆72Updated 7 years ago
- PoC for Scala and Groovy☆14Updated 9 years ago
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆25Updated 2 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Updated 8 years ago
- Record some Vulnerabilities☆44Updated 3 years ago
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Updated 7 years ago
- Log4j_dos_CVE-2021-45105☆13Updated 4 years ago
- coverage guided fuzz testing for java☆228Updated 4 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆86Updated 8 years ago
- Exploiting CVE-2017-7525 demo project with Angular7 frontend and Spring.☆18Updated 6 years ago
- ☆17Updated 7 years ago
- ☆14Updated 6 years ago
- ☆18Updated 7 years ago
- 自动化被动扫描系统分为数据源、数据处理、漏洞验证等三个子系统,本系统属于漏洞验证部分,根据提供的数据进行分布式安全验证,确定是否包含相关严重漏洞。☆49Updated 8 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆12Updated 9 years ago
- Personal CodeQL queries☆63Updated last month
- 基于JVM-Sandbox实现RASP安全监控防护☆53Updated 2 years ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆35Updated 5 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Updated 8 years ago
- CVE-2019-3799 - Spring Cloud Config Server: Directory Traversal < 2.1.2, 2.0.4, 1.4.6☆31Updated 6 years ago