Externalize Java application access to protected resources as log messages.
☆43Jan 22, 2026Updated last month
Alternatives and similar repositories for jvmxray
Users that are interested in jvmxray are comparing it to the libraries listed below
Sorting:
- ☆124Nov 8, 2023Updated 2 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Dec 8, 2022Updated 3 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- The action integrates Electronegativity, a tool to identify misconfigurations and security anti-patterns in Electron applications, into G…☆15Apr 15, 2023Updated 2 years ago
- Suricata RPMs for CentOS/RHEL and Fedora☆19Updated this week
- ☆16Sep 20, 2023Updated 2 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- OWASP Foundation web repository☆35Feb 25, 2026Updated last week
- A documentation and tracking project with the goal of making package management systems more secure.☆51Mar 5, 2021Updated 5 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Tool for introspection of SSL\TLS sessions☆142Jan 26, 2026Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- ☆23Mar 29, 2022Updated 3 years ago
- ☆25Jun 15, 2025Updated 8 months ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- A CVE Heatmap Using CalPlot☆97Jan 25, 2021Updated 5 years ago
- Laniakea is a utility for managing instances at various cloud providers and aids in setting up a fuzzing cluster.☆27Jun 1, 2021Updated 4 years ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Oct 3, 2020Updated 5 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- ☆30Jul 29, 2021Updated 4 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- ☆29Jan 15, 2017Updated 9 years ago
- IriusRisk Community☆71Sep 5, 2023Updated 2 years ago
- A community collection of security reviews of open source software components.☆97Feb 29, 2024Updated 2 years ago
- AD Live changes viewer☆36Feb 25, 2023Updated 3 years ago
- DupeKeyInjector☆134Apr 16, 2022Updated 3 years ago
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 3 weeks ago
- ☆43Oct 27, 2022Updated 3 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Apr 2, 2021Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- Client-Side Prototype Pollution Tools☆87Sep 21, 2021Updated 4 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- A full insecure kubernetes application for testing security tools☆93Oct 23, 2025Updated 4 months ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Sep 23, 2020Updated 5 years ago
- ☆38Jun 19, 2021Updated 4 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆44May 4, 2022Updated 3 years ago