dschadow / CloudSecurity
Cloud security projects with Spring Cloud Config Server and Vault
☆27Updated this week
Alternatives and similar repositories for CloudSecurity:
Users that are interested in CloudSecurity are comparing it to the libraries listed below
- Identify vulnerable libraries in Maven dependencies☆46Updated last year
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆25Updated 11 months ago
- ☆13Updated 7 months ago
- Repository to showcase various configuration recipes with various technologies☆35Updated last year
- General Open Architecture Security Questionnaire☆31Updated last year
- Java web and command line applications demonstrating various security topics☆235Updated this week
- JavaShellcodeRunner☆10Updated 11 years ago
- Serial Whitelist Application Trainer☆29Updated 5 years ago
- Vulnerable Java based Web Application☆31Updated 5 years ago
- ☆14Updated 5 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆15Updated 2 months ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated last year
- The aim of this project is to protect Java applications against CSRF attacks with the use of Synchronizer Tokens☆82Updated last week
- A tiny Java agent that blocks attacks against unsafe deserialization☆83Updated 7 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- A simple Java command-line utility to mirror the entire contents of VulnDB.☆44Updated last week
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Updated 6 years ago
- Hypertrace OpenTelemetry Java agent with payload/body and headers data capture.☆34Updated 2 months ago
- A Java library for calculating CVSSv2 and CVSSv3 scores and vectors☆39Updated 3 weeks ago
- BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.☆63Updated this week
- ☆25Updated 4 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated 6 months ago
- Crawljax: Crawling JavaScript-based Ajax Web Applications☆21Updated 11 months ago
- A framework for automating penetration testing using a plugin based architecture☆36Updated 2 years ago
- CVE-2019-3799 - Spring Cloud Config Server: Directory Traversal < 2.1.2, 2.0.4, 1.4.6☆31Updated 5 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Updated 8 years ago
- Automatically identify serialization issues in PHP Frameworks by means of an Burp Suite active scan☆42Updated 2 months ago
- JSONPath extension for BurpSuite☆29Updated 6 months ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago
- A rule for the Maven enforcer plugin to check for vulnerable artifacts within a project.☆40Updated 4 years ago