cschneider4711 / SWATLinks
Serial Whitelist Application Trainer
☆30Updated 6 years ago
Alternatives and similar repositories for SWAT
Users that are interested in SWAT are comparing it to the libraries listed below
Sorting:
- Identify vulnerable libraries in Maven dependencies☆46Updated 3 years ago
- The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Scala and Groovy projects)☆21Updated last year
- A tiny Java agent that blocks attacks against unsafe deserialization☆86Updated 8 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆191Updated 9 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Updated 11 years ago
- Owasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications.☆146Updated 8 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 10 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- Tool for introspection of SSL\TLS sessions☆142Updated this week
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 3 years ago
- Maven central doesn't do SSL when serving you JARs. Dilettante is a MiTM proxy for exploiting that.☆160Updated 11 months ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 10 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- Code Pulse is a real-time code coverage tool for penetration testing activities☆122Updated 3 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 7 years ago
- ☆92Updated 7 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110Updated 9 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Updated 6 years ago
- ☆59Updated last year
- TLS Redirection☆119Updated 8 years ago
- CVE database store☆132Updated 5 years ago
- Externalize Java application access to protected resources as log messages.☆43Updated last week
- Demo Application and Exploit☆35Updated 8 years ago
- ☆12Updated 7 years ago
- Deliberately vulnerable web application☆22Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Secure Coding Rules for Java☆31Updated 3 months ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Updated 10 years ago
- Repository to showcase various configuration recipes with various technologies☆37Updated 3 years ago