Secure Coding Rules for Java
☆32Oct 20, 2025Updated 6 months ago
Alternatives and similar repositories for JavaSCR
Users that are interested in JavaSCR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- Purely-functional library for the discriminating cryptographer.☆10Dec 12, 2017Updated 8 years ago
- BurpSuite plugin to save just the body of a request or response to a file☆21Oct 2, 2016Updated 9 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- ☆12Jul 1, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Dec 5, 2016Updated 9 years ago
- ☆14Jun 17, 2016Updated 9 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 8 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 6 months ago
- Reactive Romeo and Juliet☆15Jul 16, 2015Updated 10 years ago
- Emulate native integer and floating-point types in Python☆20May 15, 2023Updated 2 years ago
- ☆27Apr 18, 2026Updated 2 weeks ago
- Utils☆274Jan 11, 2016Updated 10 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Code and materials for the talk "Set practice: coding & using sets in Go"☆11Jul 8, 2025Updated 9 months ago
- ☆23Nov 18, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆19Mar 24, 2017Updated 9 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- A collection of captured SSH login credentials☆17Mar 28, 2021Updated 5 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 9 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆14Oct 24, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- INACTIVE - Experiment: A light-weight agent to get a port scan perspective into a useable place/format for security operations☆14Apr 10, 2023Updated 3 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Technical webinars on reverse engineering, malware analysis, and software protection.☆57Updated this week
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- WebSocket API description and implementations for several programming languages☆13Feb 9, 2026Updated 2 months ago