Serial Whitelist Application Trainer
☆31Jul 7, 2019Updated 6 years ago
Alternatives and similar repositories for SWAT
Users that are interested in SWAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jul 1, 2018Updated 7 years ago
- Kernel assisted microcontainer packer☆24Feb 15, 2019Updated 7 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- OWASP ASVS Assessment Tool☆28Nov 6, 2018Updated 7 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 9 years ago
- ☆13Feb 28, 2017Updated 9 years ago
- Portable & Custmizable Windows Defender☆13Nov 10, 2021Updated 4 years ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- Ruggedy Vulnerability Management App☆14Dec 8, 2019Updated 6 years ago
- 🗳A voting app that keeps votes in a blockchain. Build using Next.js ▲, Firebase 🔥Tailwind.css 💨and WebRTC 🗣☆13Dec 9, 2022Updated 3 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- TrueCrypt ported to wxWidgets 3.0, and some patches to build a 64-bit version on OS X.☆15Dec 5, 2015Updated 10 years ago
- Java Deserialization☆27Oct 21, 2016Updated 9 years ago
- Developer-Centric Knowledge Mining from Large Open-Source Software Repositories☆16Aug 28, 2019Updated 6 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆191May 17, 2016Updated 9 years ago
- Patch to enable KGDBOC via Serial over USB. And debug Samsung Android Kernels.☆24Jun 29, 2019Updated 6 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- ☆18Apr 2, 2017Updated 8 years ago
- Extracting resources from Sierra AGI games with Python☆16May 1, 2020Updated 5 years ago
- Code samples for the Modern JS workshop☆25Mar 20, 2019Updated 7 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- An utility package for typst package authors.☆18May 12, 2025Updated 10 months ago
- ☆208Sep 28, 2008Updated 17 years ago
- Step file (.step, .stp) models of DSA profile keycaps☆22Aug 7, 2020Updated 5 years ago
- An adaptation of the Chaos Monkey concept to Cloud Foundry application instances☆17Aug 10, 2018Updated 7 years ago
- An ESM package that uses Web Streams API to create v1, v2 or hybrid torrents in your web browser☆10Aug 5, 2025Updated 7 months ago
- Copies entire columns of one profile to another profile☆17Apr 28, 2020Updated 5 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- JS library that helps get the closest AWS region from a country code☆12Jan 14, 2023Updated 3 years ago
- A multi-arch library implementing the Argon2 password hashing algorithm.☆17Sep 4, 2023Updated 2 years ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆20Apr 17, 2020Updated 5 years ago
- ☆16Aug 9, 2017Updated 8 years ago