cschneider4711 / SWAT
Serial Whitelist Application Trainer
☆29Updated 5 years ago
Alternatives and similar repositories for SWAT:
Users that are interested in SWAT are comparing it to the libraries listed below
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Updated 10 years ago
- ☆12Updated 6 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆43Updated 8 months ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 9 years ago
- Jenkins Plugin from Contrast Security☆13Updated 7 months ago
- The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Scala and Groovy projects)☆21Updated last year
- A collection of pentest tools and resources targeting Hadoop environments☆35Updated 8 years ago
- Deliberately vulnerable web application☆22Updated 7 years ago
- Insecure web application used to test system security controls☆13Updated 2 months ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆189Updated 8 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆83Updated 7 years ago
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆25Updated last year
- Demo server for testing Java deserialization payloads☆15Updated 8 years ago
- Repository to showcase various configuration recipes with various technologies☆35Updated 2 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- Materials for 44con 2014 CANAPE Workshop☆22Updated 10 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated 9 months ago
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 3 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 6 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Updated 8 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Java Deserialization☆26Updated 8 years ago
- Vulnerable Java based Web Application☆31Updated 5 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Updated 5 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆25Updated 9 years ago