cschneider4711 / SWAT
Serial Whitelist Application Trainer
☆29Updated 5 years ago
Alternatives and similar repositories for SWAT:
Users that are interested in SWAT are comparing it to the libraries listed below
- ☆12Updated 6 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- Jenkins Plugin from Contrast Security☆13Updated 5 months ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆188Updated 8 years ago
- The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Scala and Groovy projects)☆21Updated 11 months ago
- Java Deserialization☆26Updated 8 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆31Updated 10 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆83Updated 7 years ago
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆25Updated last year
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 6 years ago
- A rule for the Maven enforcer plugin to check for vulnerable artifacts within a project.☆40Updated 4 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago
- ZAP Management Scripts☆21Updated last week
- A Java Web Application with common legacy security flaws for tests with Arachni Scanner and ModSecurity☆21Updated 6 months ago
- Repository to showcase various configuration recipes with various technologies☆35Updated 2 years ago
- ☆13Updated 7 years ago
- ☆30Updated 2 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.☆20Updated 5 years ago
- ☆58Updated 2 weeks ago
- Externalize Java application access to protected resources as log messages.☆41Updated 8 months ago
- TSLint rules for Angular☆18Updated 6 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 9 years ago
- ☆20Updated 6 years ago
- Vulnerable Grails application☆43Updated 9 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆121Updated 7 years ago
- Demo Application and Exploit☆35Updated 7 years ago