corda / djvm
Deterministic Sandbox for the JVM
☆27Updated last year
Alternatives and similar repositories for djvm:
Users that are interested in djvm are comparing it to the libraries listed below
- JavaShellcodeRunner☆10Updated 11 years ago
- Non-interactive Java debugger with Groovy☆79Updated 10 months ago
- ☆70Updated 6 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆189Updated 8 years ago
- How to Exploit Blockchain Public Chain and Smart Contract Vulnerability☆8Updated 5 years ago
- Run Swing based GUI application within the Docker container through the Jetbrains Projector, and access it from browsers.☆18Updated 3 years ago
- ☆145Updated 5 years ago
- NoneAge Blockchain Security Tutorial☆42Updated 5 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Updated 7 years ago
- ERPScan Public POC for CVE-2018-2636☆22Updated 7 years ago
- A static analysis API for finding deserialization attack gadgets☆38Updated 2 years ago
- Log4j_dos_CVE-2021-45105☆13Updated 3 years ago
- Place for random PoCs☆17Updated 4 years ago
- ☆17Updated 6 years ago
- PoC for Scala and Groovy☆14Updated 8 years ago
- 应急响应实战笔记,一个安全工程师的自我修养。☆17Updated 5 years ago
- Ontology Triones Service Node security checklist(本体北斗共识集群安全执行指南)☆46Updated 3 years ago
- DolphinChain is the first Vulnerable Blockchain Application in the world!☆16Updated 5 years ago
- CVE-2019-3799 - Spring Cloud Config Server: Directory Traversal < 2.1.2, 2.0.4, 1.4.6☆31Updated 5 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆104Updated 8 years ago
- Personal CodeQL queries☆59Updated last week
- CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC☆86Updated 2 years ago
- The project is a simple vulnerability Demo environment written by SpringBoot. Here, I deliberately wrote a vulnerability environment wher…☆87Updated 3 years ago
- CVE-2017-10271 POC☆29Updated 7 years ago
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆25Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆12Updated 8 years ago
- Spring messaging STOMP protocol RCE☆114Updated 6 years ago
- IP画像业务安全版私有化部署SDK☆13Updated 2 years ago
- ☆18Updated 6 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago