dschadow / CloudSecurityLinks
Cloud security projects with Spring Cloud Config Server and Vault
☆29Updated last week
Alternatives and similar repositories for CloudSecurity
Users that are interested in CloudSecurity are comparing it to the libraries listed below
Sorting:
- ☆14Updated last month
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- ☆15Updated 6 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 6 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Updated 7 years ago
- Java web and command line applications demonstrating various security topics☆237Updated last week
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Updated 9 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆108Updated 9 years ago
- General Open Architecture Security Questionnaire☆31Updated 2 years ago
- A static analysis API for finding deserialization attack gadgets☆38Updated 2 years ago
- Exploiting CVE-2017-7525 demo project with Angular7 frontend and Spring.☆18Updated 6 years ago
- BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.☆66Updated 3 months ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- siberas JMX exploitation toolkit☆131Updated 2 years ago
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Updated 5 years ago
- Awesome Java Security Resources 🕶☕🔐☆310Updated 2 years ago
- Full TTY reverse shell over SSH☆58Updated 5 years ago
- A Python3 module to assist in fuzzing web applications☆57Updated last year
- Crawljax: Crawling JavaScript-based Ajax Web Applications☆22Updated 8 months ago
- INTERCEPT / Policy as Code Auditing & Compliance☆87Updated 3 months ago
- Sample exploits of common vulnerabilities in Java librarires☆24Updated last year
- The aim of this project is to protect Java applications against CSRF attacks with the use of Synchronizer Tokens☆87Updated last week
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Burp Suite AMF Extension☆48Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆41Updated 6 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆67Updated 5 years ago
- Automate security tests using Burp Suite.☆229Updated last year
- Essential tool for finding blind injection attacks.☆50Updated 6 years ago
- ☆24Updated 5 years ago
- a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)☆22Updated 6 years ago