fergarrui / custom-bytecode-analyzerLinks
Java bytecode analyzer customizable via JSON rules
☆74Updated 7 years ago
Alternatives and similar repositories for custom-bytecode-analyzer
Users that are interested in custom-bytecode-analyzer are comparing it to the libraries listed below
Sorting:
- A static analysis API for finding deserialization attack gadgets☆38Updated 2 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Updated 5 years ago
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Updated 6 years ago
- ☆133Updated 9 years ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆91Updated 7 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆123Updated 7 years ago
- Spring messaging STOMP protocol RCE☆113Updated 7 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆107Updated 9 years ago
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆26Updated last year
- Java bytecode analysis/deobfuscation tool☆197Updated 7 years ago
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆74Updated 8 months ago
- Call graph generator for JVM bytecode☆18Updated 8 years ago
- A Java serializer in JavaScript☆81Updated 7 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆188Updated 9 years ago
- An automatic testing tool for Java software☆25Updated 7 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆85Updated 7 years ago
- Fake currentTimeMillis() without class loader hacks☆119Updated 4 years ago
- Demo Application and Exploit☆35Updated 8 years ago
- TamiFlex facilitates static analysis of programs that use reflection and custom class loaders☆44Updated 4 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 6 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- Deprecated: Please visit https://github.com/github/codeql instead.☆81Updated 3 years ago
- An analyzer of JNI code that matches native code information with Java code☆22Updated 3 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 9 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- A Tool to fuzz Intent on Android☆177Updated 6 years ago
- Java Deserialization☆26Updated 8 years ago
- Java tracing agent and live trace client☆73Updated 2 years ago
- ☆46Updated 9 years ago