fortify-presales / IWA-JavaView external linksLinks
An insecure Java/Spring web application for use in DevSecOps scenarios.
☆16Updated this week
Alternatives and similar repositories for IWA-Java
Users that are interested in IWA-Java are comparing it to the libraries listed below
Sorting:
- Deprecated; please use https://github.com/marketplace/actions/fortify-ast-scan instead☆18Nov 1, 2023Updated 2 years ago
- Example of an ELF parser to learn about the ELF format☆10Oct 6, 2024Updated last year
- A software held to act as a charm to avert spam and bring good messages☆10Mar 30, 2024Updated last year
- A Native Swift Core Bluetooth LE Central (Client) Abstraction Driver☆14Nov 12, 2025Updated 3 months ago
- Voice Stress Detector Framework and iOS app☆13Jan 2, 2023Updated 3 years ago
- A simple Discord bot imported from GFL's Gitlab. This was made using Java.☆11May 10, 2020Updated 5 years ago
- Searchable transcripts of the Post Office Horizon IT Inquiry hearings☆11Jul 9, 2025Updated 7 months ago
- 一个小小的云fitting计算器,计算方法来自微博@摸发虱痒☆10Apr 10, 2022Updated 3 years ago
- BurpSuite dockerized☆11Mar 2, 2018Updated 7 years ago
- How to setup the USG to use ProtonVPN☆12Nov 21, 2018Updated 7 years ago
- ☆10Jan 18, 2025Updated last year
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Meta-specification framework for AI Agents to generate Spec-driven X toolkits automatically.☆28Nov 22, 2025Updated 2 months ago
- Exemple d'extension Burp permettant d'utiliser les fichiers de configuration de proxy PAC☆11Feb 28, 2016Updated 9 years ago
- ☆12Sep 19, 2024Updated last year
- Tạo cơ sở dữ liệu quản lý hiệu thuốc☆10Dec 4, 2023Updated 2 years ago
- 收集各种各样的exp☆11Aug 20, 2015Updated 10 years ago
- This project is built using Python and FastAPI, offering a modern and efficient solution for managing an online pharmacy platform. With …☆11Jul 26, 2023Updated 2 years ago
- My book materials☆12Aug 18, 2025Updated 5 months ago
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- Reverse transparent protocol agnostic socks proxy.☆17Jan 14, 2020Updated 6 years ago
- ☆12Feb 22, 2024Updated last year
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 8 years ago
- Web Based Inventory and Purchase Management System for Pharmacies☆12Jan 16, 2022Updated 4 years ago
- A simple TC Ingress program that blocks incoming packets based off of the inner IP header's source IP.☆12Jul 22, 2020Updated 5 years ago
- ☆13Mar 1, 2020Updated 5 years ago
- Creative Racket competition☆14Nov 7, 2022Updated 3 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- hyperscan for openresty☆14May 20, 2022Updated 3 years ago
- RADIUS Protocol on Elixir☆15Jun 14, 2023Updated 2 years ago
- Building a small bank with Clojure☆15Jul 7, 2019Updated 6 years ago
- Fortify SCA Plugin for SonarQube☆14Jun 7, 2021Updated 4 years ago
- ☆17Oct 8, 2025Updated 4 months ago
- Open source library for decoding ambient Bluetooth Low Energy (BLE) advertising packet manufacturer-specific data. We believe in an open …☆19Jan 28, 2026Updated 2 weeks ago
- ☆14Jan 12, 2022Updated 4 years ago
- Checklist of the most important security countermeasures when designing, testing, and releasing your API☆12Nov 8, 2022Updated 3 years ago
- Command-line library for Clojure☆27Aug 29, 2016Updated 9 years ago
- Sketch code along the reading of Mining Massive Datasets☆14Feb 9, 2016Updated 10 years ago
- The Android SDK for ChatSecure-Push-Server☆16Jun 16, 2016Updated 9 years ago