Analysis for access-control vulnerabilities in Java Spring Security applications.
☆14May 25, 2022Updated 3 years ago
Alternatives and similar repositories for authcheck
Users that are interested in authcheck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A benchmark to evaluate taint analysis☆29Jun 20, 2022Updated 3 years ago
- ☆31May 1, 2025Updated last year
- ☆12Dec 15, 2018Updated 7 years ago
- 最全中华古诗词数据库, 唐宋两朝近一万四千古诗人, 接近5.5万首唐诗加26万宋诗. 两宋时期1564位词人,21050首词。☆13Feb 9, 2018Updated 8 years ago
- oh my soot !☆93Aug 10, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Nov 27, 2017Updated 8 years ago
- https://hackmd.io/s/r1SgsdF3X☆10Dec 21, 2018Updated 7 years ago
- A simple tool to do linux emergency check☆11Mar 16, 2020Updated 6 years ago
- Composite GitHub CI Action containing the minimal viable security lint for brave repositories☆22May 12, 2026Updated last week
- Taint analysis implementation based on Heros and Soot☆45May 6, 2024Updated 2 years ago
- CO-RE code for the Netdata eBPF plugin.☆16May 11, 2026Updated last week
- Rust wrapper of libtracecmd☆26Nov 2, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Golang eBPF RASP☆10Jul 19, 2023Updated 2 years ago
- 一个java代码审计辅助工具☆29Nov 2, 2022Updated 3 years ago
- This is an implementation of the Language Server Protocol for Jimple. It enables your IDE to provide code exploring features while workin…☆12Dec 15, 2023Updated 2 years ago
- ☆29Aug 30, 2022Updated 3 years ago
- The official repo of Doop, the declarative pointer analysis framework.☆208May 13, 2026Updated last week
- Docker + Travis-CI + Cron + JohnTheRipper(Jumbo) = Bleeding edge builds☆17Mar 7, 2018Updated 8 years ago
- golang 获取https 端口证书信息 子域名☆14Sep 23, 2019Updated 6 years ago
- A blog of Programming Languages Group @Purdue☆12May 2, 2026Updated 2 weeks ago
- ☆11Oct 10, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PLCT实验室2020年开放日活动的演讲资料☆13Dec 29, 2020Updated 5 years ago
- ☆14Oct 4, 2015Updated 10 years ago
- outline and links for PLDI 2022 tutorial☆17Jun 13, 2022Updated 3 years ago
- Another reverse proxy that provides authentication with OpenID Connect☆10Jul 10, 2023Updated 2 years ago
- IDE/AL - Alias-Aware Framework for Interprocedural Dataflow Analysis☆10Mar 10, 2018Updated 8 years ago
- Twitter account analysis☆15Sep 26, 2019Updated 6 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆16May 8, 2019Updated 7 years ago
- A training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessmen…☆19Sep 29, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Java安全学习历程☆42Jul 7, 2023Updated 2 years ago
- ☆10Aug 16, 2012Updated 13 years ago
- ☆22May 13, 2026Updated last week
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆24Apr 27, 2026Updated 3 weeks ago
- ☆15Apr 28, 2023Updated 3 years ago
- Security papers about software vulnerabilities and exploits☆14Jan 16, 2019Updated 7 years ago
- Xayn AI☆18May 9, 2022Updated 4 years ago