davidecavestro / elastic-apm-java-agent-pocLinks
A POC for the Java agent of Elastic APM
☆12Updated 7 years ago
Alternatives and similar repositories for elastic-apm-java-agent-poc
Users that are interested in elastic-apm-java-agent-poc are comparing it to the libraries listed below
Sorting:
- Docker image which contains oracle jdk (7 and 8)☆46Updated 2 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 3 years ago
- This repository contains all base Dockerfiles for Docker that I use, and are available at Docker registry.☆68Updated 6 years ago
- Kibana 4 Templates for Suricata IDPS☆33Updated 9 years ago
- 演示dubbo rpc Apache commons collections 的Java序列化漏洞☆42Updated 10 years ago
- ☆28Updated 8 years ago
- A standalone version of the JMX tool of JBoss AS☆30Updated 8 months ago
- 分布式的sqlmapapi☆11Updated 9 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 8 years ago
- Graphical Web Interface for OSSEC☆73Updated 6 years ago
- PoC for Scala and Groovy☆14Updated 9 years ago
- This cookbook installs Nexpose☆12Updated 2 years ago
- Docker for CentOS Weblogic with domain☆12Updated 8 years ago
- Juniper backdoor☆14Updated 10 years ago
- Trigger automated Acunetix scans as part of your web application's build process☆32Updated last year
- ☆14Updated 7 years ago
- everything in one place - the best description I could come up with ;)☆27Updated 5 years ago
- distributed nmap using Celery☆11Updated 8 years ago
- fix time for java application using javaAgent☆23Updated 8 years ago
- AntiXSS for Java is a port of the Microsoft Anti-Cross Site Scripting (AntiXSS) v1.5 library for .NET applications. The library requires …☆16Updated 13 years ago
- Serial Whitelist Application Trainer☆30Updated 6 years ago
- Web scan foundation framework☆23Updated 8 years ago
- 根据Golismero源码二次开发 的分布式漏洞扫描器(调试版)☆18Updated 9 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 8 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 10 years ago
- ☆40Updated 9 years ago
- A bunch of scripts used for network defense during competitions.☆15Updated 10 years ago
- ☆15Updated 6 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 10 years ago