spoofzu / jvmxrayLinks
Externalize Java application access to protected resources as log messages.
☆43Updated 2 weeks ago
Alternatives and similar repositories for jvmxray
Users that are interested in jvmxray are comparing it to the libraries listed below
Sorting:
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 5 years ago
- ☆57Updated 5 years ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆160Updated last year
- ☆21Updated 6 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 3 years ago
- Java Observability Toolkit☆62Updated last year
- Automate security tests using Burp Suite.☆233Updated last year
- Secure Coding Rules for Java☆31Updated 3 months ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- ☆69Updated 6 months ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Updated 5 years ago
- Application and Service Fingerprinting☆132Updated 3 years ago
- DupeKeyInjector☆135Updated 3 years ago
- Code Review Audit Script Scanner☆143Updated 3 months ago
- Popcorn - the JSON fuzzer☆22Updated 11 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 3 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Updated 6 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆44Updated 3 years ago
- Repository to showcase various configuration recipes with various technologies☆36Updated 3 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆58Updated 7 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆119Updated 4 years ago
- Burp Extension for AWS Signing☆90Updated last year
- Scripts that we use for pentesting☆42Updated 8 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆73Updated 6 months ago
- A Security Scanner for Go☆26Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆109Updated 6 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆66Updated 2 years ago