google / safe-html-typesLinks
Security contract types
☆60Updated 3 years ago
Alternatives and similar repositories for safe-html-types
Users that are interested in safe-html-types are comparing it to the libraries listed below
Sorting:
- Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link …☆165Updated 2 months ago
- This is both a terrible and wonderful idea.☆12Updated 6 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 3 years ago
- Parse Content Security Policy headers, warn about policy errors, safely manipulate, render, and optimise policies☆72Updated 2 months ago
- A Modest Content Security Proposal☆41Updated 4 years ago
- Serial Whitelist Application Trainer☆30Updated 6 years ago
- Automatically Preventing Code Injection Attacks on Node.js☆78Updated 3 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆86Updated 8 years ago
- CVE database store☆132Updated 5 years ago
- WebAppSec Content Security Policy☆221Updated 3 months ago
- Fetch Metadata☆75Updated 10 months ago
- ☆59Updated last year
- Inspect your builds to look for changes in filesystem, network traffic and running processes.☆13Updated 7 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆191Updated 9 years ago
- CVE database☆21Updated 5 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Updated 4 years ago
- Code Pulse is a real-time code coverage tool for penetration testing activities☆122Updated 3 years ago
- Popcorn - the JSON fuzzer☆22Updated 11 years ago
- Auditing for TLS certificates, Java code.☆41Updated 6 years ago
- ☆113Updated this week
- DEPRECATED - web security checklist for Firefox Services☆78Updated 5 years ago
- Equal Experts Secure Delivery Playbook☆26Updated 2 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Updated 5 years ago
- Static Program Analysis for Reliable Trusted Apps☆23Updated 7 years ago
- Externalize Java application access to protected resources as log messages.☆43Updated 2 weeks ago
- A tool to perform static analysis on regexes to determine whether they are vulnerable to ReDoS.☆111Updated 3 years ago
- ☆40Updated last month
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Updated 8 years ago
- A pytest-inspired, DAST framework, capable of identifying vulnerabilities in a distributed, micro-service ecosystem through chaos enginee…☆226Updated last year
- A list of ReDoS vulnerabilities in npm modules found by the Software Lab at TU Darmstadt. For each vulnerability, there is a proof-of-con…☆60Updated 8 years ago