cschneider4711 / SWATLinks
Serial Whitelist Application Trainer
☆29Updated 6 years ago
Alternatives and similar repositories for SWAT
Users that are interested in SWAT are comparing it to the libraries listed below
Sorting:
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆190Updated 9 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆86Updated 7 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 9 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Updated 11 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆108Updated 9 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Scala and Groovy projects)☆21Updated last year
- ☆58Updated 8 months ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 7 years ago
- Maven central doesn't do SSL when serving you JARs. Dilettante is a MiTM proxy for exploiting that.☆160Updated 7 months ago
- CVE database store☆132Updated 4 years ago
- Owasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications.☆144Updated 8 years ago
- Tool for introspection of SSL\TLS sessions☆141Updated 2 months ago
- ☆93Updated 6 years ago
- Code Pulse is a real-time code coverage tool for penetration testing activities☆122Updated 2 years ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.☆21Updated 6 years ago
- PoC for Scala and Groovy☆14Updated 9 years ago
- Externalize Java application access to protected resources as log messages.☆43Updated last month
- This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CS…☆20Updated 8 years ago
- Deliberately vulnerable web application☆22Updated 8 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Updated 8 years ago
- ☆30Updated 3 years ago
- ☆128Updated 8 years ago
- Secure Coding Rules for Java☆31Updated 11 months ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- Java Deserialization☆26Updated 8 years ago
- Demo Application and Exploit☆35Updated 8 years ago