cschneider4711 / SWAT
Serial Whitelist Application Trainer
☆29Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for SWAT
- Identify vulnerable libraries in Maven dependencies☆45Updated last year
- ☆12Updated 6 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆31Updated 10 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Updated 8 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 6 years ago
- Viewstate Hidden Control Enumerator☆17Updated 11 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated last year
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆34Updated 7 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 6 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 10 years ago
- Deliberately vulnerable web application☆22Updated 7 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago
- Java Deserialization☆26Updated 8 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 8 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆25Updated 9 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆33Updated 7 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆121Updated 6 years ago
- PoC for Scala and Groovy☆14Updated 8 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆185Updated 8 years ago
- .NET Deserialization Passive Scanner☆45Updated 6 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated 6 months ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 3 months ago
- ☆14Updated 6 years ago
- Demo Application and Exploit☆35Updated 7 years ago
- Nashorn Post Exploitation☆31Updated 6 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 9 years ago