fortify / ssc-restapi-client
Communicate with Fortify Software Security Center through REST API in java, a swagger generated client
☆17Updated 4 months ago
Alternatives and similar repositories for ssc-restapi-client:
Users that are interested in ssc-restapi-client are comparing it to the libraries listed below
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆41Updated 7 months ago
- ☆28Updated 2 years ago
- A static analysis API for finding deserialization attack gadgets☆38Updated 2 years ago
- A simple Java command-line utility to mirror the entire contents of VulnDB.☆44Updated last month
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228) and the possible Spring RCE vulnerability.☆34Updated 2 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- ☆78Updated 9 months ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Updated last year
- OWASP Foundation Web Respository☆34Updated 4 months ago
- A Java library for calculating CVSSv2 and CVSSv3 scores and vectors☆44Updated last month
- ☆92Updated 3 months ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- ☆41Updated 4 years ago
- An example repository that demonstrates how the build custom CodeQL bundles that include query customizations through the `Customizations…☆25Updated 2 years ago
- ☆23Updated 11 months ago
- Burp extension to passively scan for applications revealing software version numbers☆30Updated 8 months ago
- Plattform to develop and experiment with existing java web attacks.☆31Updated 7 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆26Updated 2 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Updated 6 years ago
- ☆13Updated 4 years ago
- ☆38Updated 4 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆121Updated 7 years ago
- ☆13Updated 9 months ago
- ☆31Updated 5 years ago
- ☆22Updated 2 years ago
- ☆15Updated 3 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆17Updated 3 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆39Updated 2 years ago
- Dependency Confusion Security Testing Tool☆44Updated 2 years ago