A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.
☆24Jul 10, 2019Updated 6 years ago
Alternatives and similar repositories for objectmap
Users that are interested in objectmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 6 years ago
- Vulnerable webapp testbed☆24May 11, 2016Updated 9 years ago
- ☆11Jun 5, 2015Updated 10 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A fuzzy parser for C/C++ that creates semantic code property graphs☆37Oct 15, 2020Updated 5 years ago
- Simplified version of flashrom for installing new system firmware☆23Mar 10, 2023Updated 3 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ☆12May 27, 2021Updated 4 years ago
- Jupyter Kernel for CodeQL☆16Feb 26, 2025Updated last year
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- ☆12Jul 3, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Yet Another Vulnerability Database☆16Jul 23, 2021Updated 4 years ago
- A Vim syntax definition for Zinit commands in any ft=zsh file☆11Mar 29, 2025Updated last year
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- Source code for the equivalence checker presented in the PLDI 2019 paper, "Semantic Program Alignment for Equivalence Checking"☆44Apr 2, 2020Updated 6 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆33Nov 24, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MapGuard is a library that enforces a security policy for mmap based page allocations.☆21Dec 14, 2025Updated 3 months ago
- Neural Network Semantic Parser for Almond☆15Apr 11, 2019Updated 6 years ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆19Mar 27, 2023Updated 3 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Apr 30, 2023Updated 2 years ago
- Customized version of QEMU 2.4.0 exposing the TCG frontend and the helpers☆18Dec 22, 2025Updated 3 months ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- ☆44Jan 30, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- ☆17May 22, 2021Updated 4 years ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- User defined static call-tree constraints in C++. This is the implementation of the tool for my masters thesis.☆14Sep 25, 2018Updated 7 years ago
- 快速对自己项目中引入的第三方开源库进行1day patch检索,patch数据每天晚上11点更新☆21Jan 27, 2022Updated 4 years ago
- SootDiff - Bytecode Comparison Across Different Java Compilers☆18May 24, 2024Updated last year
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago