Serial Whitelist Application Trainer
☆30Jul 7, 2019Updated 6 years ago
Alternatives and similar repositories for SWAT
Users that are interested in SWAT are comparing it to the libraries listed below
Sorting:
- ☆12Jul 1, 2018Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- A Java Classloader based on class whitelist☆16Sep 19, 2024Updated last year
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- Kernel assisted microcontainer packer☆24Feb 15, 2019Updated 7 years ago
- Lockheed Martin developed utility to compare two CycloneDX SBOMs☆19Oct 21, 2021Updated 4 years ago
- [ARCHIVED] ChaosHub - Your Chaos Engineering Control Plane☆15Nov 24, 2020Updated 5 years ago
- Spring Polyglot☆18Mar 5, 2022Updated 3 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆24Jun 29, 2019Updated 6 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Aug 11, 2021Updated 4 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆14Jun 7, 2024Updated last year
- Code samples for the Modern JS workshop☆25Mar 20, 2019Updated 6 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- ☆29Mar 15, 2017Updated 8 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆191May 17, 2016Updated 9 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Thymeleaf test suite☆29Dec 10, 2022Updated 3 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Feb 1, 2017Updated 9 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- JSON API's Are Automatically Protected Against CSRF, And Google Almost Took It Away.☆34Jul 9, 2017Updated 8 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- Telegram Widget Authenticator For Keycloak☆13Dec 20, 2025Updated 2 months ago
- Just a single binary no config file Chromium(64bit) updater.☆11May 5, 2018Updated 7 years ago
- Reliable Keycloak user migration at scale. Features include bounded concurrency, durable retries, and zero data loss.☆31Jan 13, 2026Updated last month
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Example full stack rust project using Sycamore for wasm and actix for backend, implementing BFF and OIDC for authentication.☆11Feb 4, 2023Updated 3 years ago
- The repository contains tooling to setup the container based stack.☆15Updated this week
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆13Feb 28, 2017Updated 9 years ago
- Collection of tools for fetching and processing Street View imagery, adapted from code by @kotarohara☆12Feb 13, 2026Updated 2 weeks ago
- Another reverse proxy that provides authentication with OpenID Connect☆10Jul 10, 2023Updated 2 years ago
- O'Reilly Live Training☆13Mar 20, 2024Updated last year
- Server and development environment provisioning data and configurations☆10Jun 25, 2018Updated 7 years ago
- DEPRECATED: Element Hiding Helper extension for Adblock Plus☆11Dec 1, 2017Updated 8 years ago
- Bot software for creating Wikipedia articles using geographical data☆10Feb 28, 2017Updated 9 years ago