Secure Coding Rules for Java
☆31Oct 20, 2025Updated 4 months ago
Alternatives and similar repositories for JavaSCR
Users that are interested in JavaSCR are comparing it to the libraries listed below
Sorting:
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Amazon Web Services (AWS) Microsoft Threat Modeling Tool Template☆16Aug 19, 2021Updated 4 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆17Feb 10, 2016Updated 10 years ago
- CVE-2019-16097 PoC☆23Sep 19, 2019Updated 6 years ago
- ☆23Nov 18, 2015Updated 10 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- A websocket proxy☆55Nov 13, 2017Updated 8 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 4 months ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Dec 5, 2016Updated 9 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- ☆29Mar 15, 2017Updated 8 years ago
- ☆64Feb 12, 2022Updated 4 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 6 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- This is where we work on the newsletter☆28Dec 2, 2017Updated 8 years ago
- HTTP Desync Attack☆28May 17, 2020Updated 5 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- Use burp's JS static code analysis on code from your local system.☆43Dec 22, 2016Updated 9 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- tcprelay.py with support for multiple iDevices☆40Mar 27, 2016Updated 9 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year
- A static analysis API for finding deserialization attack gadgets☆38Nov 7, 2022Updated 3 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Practice Web App written in python with some vulnerabilities.☆34Mar 19, 2021Updated 4 years ago
- An isolated environment for DNS cache poisoning attack investigation and demonstration.☆10Nov 22, 2020Updated 5 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago