righettod / poc-jwtLinks
POC about usage of JSON Web Tokens (JWT) in a secure way.
☆32Updated 6 years ago
Alternatives and similar repositories for poc-jwt
Users that are interested in poc-jwt are comparing it to the libraries listed below
Sorting:
- OWASP Security Logging library for Java☆118Updated last year
- The OWASP Java Encoder is a Java 1.5+ simple-to-use drop-in high-performance encoder class with no dependencies and little baggage. This …☆519Updated 5 months ago
- OWASP CSRFGuard 3.1.0☆161Updated 3 years ago
- The aim of this project is to protect Java applications against CSRF attacks with the use of Synchronizer Tokens☆86Updated this week
- Awesome Java Security Resources 🕶☕🔐☆310Updated last year
- Hdiv CE | Application Self-Protection☆215Updated 8 months ago
- Given JSON-like content, The JSON Sanitizer converts it to valid JSON.☆212Updated last year
- OWASP SonarQube Project☆110Updated 5 years ago
- ☆36Updated 9 years ago
- Hands-On Workshop for OAuth 2.0 and OpenID Connect 1.0☆91Updated last year
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆189Updated 9 years ago
- SAML2 Burp Extension☆426Updated 2 months ago
- An intentionally-vulnerable web application, ported from https://github.com/jzheaux/terracotta-bank-spring☆41Updated 2 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆85Updated 7 years ago
- ThreadFix is a software vulnerability management platform. This GitHub site is far out of date. Please go to www.threadfix.it for up-to-d…☆340Updated 2 years ago
- Takes third-party HTML and produces HTML that is safe to embed in your web application. Fast and easy to configure.☆902Updated 10 months ago
- Complimenting code to Java Crypto Blog series, at https://www.veracode.com/blog/research/how-get-started-using-java-cryptography-securely☆57Updated 5 years ago
- devonfw Java stack - create enterprise-grade business apps in Java safe and fast☆84Updated 2 years ago
- POC in order to protect an document upload application feature against "malicious" document submission.☆45Updated 4 years ago
- PoC: Spring Boot Keycloak Signed & Encrypted JWT Example☆17Updated 5 years ago
- Source code that accompanies the book API Security in Action☆158Updated 2 years ago
- oauth security guidelines☆227Updated 6 years ago
- A developer-friendly, modular library for all core cryptographic operations written using Java.☆23Updated 2 years ago
- Security Knowledge Framework (SKF) Python Flask / Angular project☆819Updated last year
- A rule for the Maven enforcer plugin to check for vulnerable artifacts within a project.☆41Updated 4 years ago
- Automate security tests using Burp Suite.☆229Updated last year
- A toolkit for building self-defending applications through real-time event detection and response☆283Updated 2 years ago
- Vulnerable Java based Web Application☆269Updated last year
- The OWASP ZAP Jenkins Plugin extends the functionality of the ZAP security tool into a CI Environment.☆60Updated 10 months ago
- Mobile Security testing Framework☆41Updated 6 years ago