dschadow / CloudSecurity
Cloud security projects with Spring Cloud Config Server and Vault
☆28Updated last week
Alternatives and similar repositories for CloudSecurity
Users that are interested in CloudSecurity are comparing it to the libraries listed below
Sorting:
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆26Updated last year
- ☆14Updated 6 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆123Updated 7 years ago
- Java web and command line applications demonstrating various security topics☆237Updated 3 weeks ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆83Updated 7 years ago
- Repository to showcase various configuration recipes with various technologies☆35Updated 2 years ago
- siberas JMX exploitation toolkit☆130Updated 2 years ago
- Serial Whitelist Application Trainer☆29Updated 5 years ago
- The aim of this project is to protect Java applications against CSRF attacks with the use of Synchronizer Tokens☆86Updated 3 weeks ago
- JavaShellcodeRunner☆10Updated 11 years ago
- Vulnerable Java based Web Application☆31Updated 5 years ago
- ☆14Updated last year
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Updated 8 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Rules for Bearer SAST☆27Updated last month
- A simple Java command-line utility to mirror the entire contents of VulnDB.☆44Updated 5 months ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Updated 10 years ago
- BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.☆65Updated 2 weeks ago
- Sample exploits of common vulnerabilities in Java librarires☆23Updated last year
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆10Updated 4 years ago
- Application Intrusion Detection projects☆19Updated 9 months ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆27Updated 3 years ago
- A static analysis API for finding deserialization attack gadgets☆38Updated 2 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 9 months ago
- create cypher create statements for neo4j out of netstat files from multiple machines☆41Updated 4 years ago
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Updated 5 years ago
- Hacking and Securing Java☆73Updated 6 years ago