fortify / ssc-restapi-clientLinks
Communicate with Fortify Software Security Center through REST API in java, a swagger generated client
☆19Updated 7 months ago
Alternatives and similar repositories for ssc-restapi-client
Users that are interested in ssc-restapi-client are comparing it to the libraries listed below
Sorting:
- ☆31Updated 3 years ago
- A collection of my Semgrep rules☆51Updated 2 years ago
- Fortify Jenkins plugin☆26Updated 11 months ago
- ☆15Updated 4 months ago
- ☆14Updated 5 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Updated 8 years ago
- OWASP Benchmark Project Utilities - Provides scorecard generation and crawling tools for Benchmark style test suites.☆20Updated last week
- Automated submission of FoD and SSC vulnerabilities to external systems☆25Updated last year
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆48Updated 5 years ago
- ☆87Updated last year
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆28Updated 4 years ago
- OWASP Foundation Web Respository☆37Updated 4 months ago
- LFI/RFI Payload Tests Project☆36Updated 6 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- Burp extension to generate multi-step CSRF POC.☆31Updated 6 years ago
- Compiled dataset of Java deserialization CVEs☆60Updated 5 years ago
- Jekyll Files for cloudsecwiki.com☆49Updated 4 years ago
- ☆25Updated last year
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Updated 7 years ago
- Automatically modify the User-Agent header in all Burp requests☆62Updated 8 years ago
- ☆101Updated last week
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- A static analysis API for finding deserialization attack gadgets☆38Updated 3 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 3 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated last year
- Damn Vulnerable Java (EE) Application☆144Updated 2 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Updated 2 years ago
- ☆76Updated 8 years ago
- POC in order to materialize CSRF prevention concepts described in the following OWASP CSRF cheatsheet☆30Updated 8 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Updated 3 years ago