frohoff / serialysis
from http://weblogs.java.net/blog/emcmanus/archive/2007/06/disassembling_s.html
☆10Updated 10 years ago
Related projects: ⓘ
- Identify vulnerable libraries in Maven dependencies☆45Updated last year
- From https://code.google.com/p/jdeserialize/☆34Updated 10 years ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.☆20Updated 5 years ago
- Automatically exported from code.google.com/p/javasnoop☆27Updated 9 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆56Updated 4 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆31Updated 10 years ago
- Repository to showcase various configuration recipes with various technologies☆35Updated last year
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 6 years ago
- Viewstate Hidden Control Enumerator☆17Updated 11 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Updated 8 years ago
- Java bytecode analyzer customizable via JSON rules☆74Updated 6 years ago
- Maven central doesn't do SSL when serving you JARs. Dilettante is a MiTM proxy for exploiting that.☆159Updated 2 years ago
- Policy Instantiation and Enforcement (PIE)☆9Updated 9 years ago
- ☆11Updated 7 years ago
- Experimental Java agent to stomp on things.☆15Updated 5 years ago
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆25Updated 9 months ago
- Serial Whitelist Application Trainer☆29Updated 5 years ago
- Insecure web application used to test system security controls☆13Updated 2 weeks ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 8 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆103Updated 8 years ago
- A deliberately vulnerable Android application to demonstrate exfiltration scenarios☆11Updated 4 years ago
- Maven tooling for static code analysis☆32Updated last month
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆23Updated last year
- Static Program Analysis for Reliable Trusted Apps☆21Updated 5 years ago
- ☆75Updated this week
- Candle Decompiler☆82Updated 10 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated 4 months ago
- Secure Coding Rules for Java☆30Updated last year
- Jenkins Plugin from Contrast Security☆13Updated last month