jfrog / jfrog-spring-tools
☆79Updated 3 years ago
Alternatives and similar repositories for jfrog-spring-tools
Users that are interested in jfrog-spring-tools are comparing it to the libraries listed below
Sorting:
- Simple local scanner for applications containing vulnerable Spring libraries☆126Updated 2 years ago
- CVE-2022-22963 PoC☆116Updated 3 years ago
- Dependency Combobulator☆93Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆104Updated 2 years ago
- ☆86Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 3 months ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 3 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Updated 9 months ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆14Updated 4 years ago
- ☆30Updated last year
- Scans and catches callbacks of systems that are impacted by Log4J Log4Shell vulnerability across specific headers.☆60Updated 3 years ago
- ☆38Updated 3 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 3 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 2 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆29Updated last year