Externalize Java application access to protected resources as log messages.
☆43Jan 22, 2026Updated last month
Alternatives and similar repositories for jvmxray
Users that are interested in jvmxray are comparing it to the libraries listed below
Sorting:
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Dec 8, 2022Updated 3 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- The action integrates Electronegativity, a tool to identify misconfigurations and security anti-patterns in Electron applications, into G…☆15Apr 15, 2023Updated 2 years ago
- ☆15Nov 4, 2020Updated 5 years ago
- Suricata RPMs for CentOS/RHEL and Fedora☆19Updated this week
- ☆102May 5, 2020Updated 5 years ago
- Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates☆20Dec 15, 2021Updated 4 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- OWASP Foundation web repository☆35Feb 25, 2026Updated last week
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Software Component Verification Standard (SCVS)☆156Apr 1, 2025Updated 11 months ago
- ☆25Jun 15, 2025Updated 8 months ago
- A CVE Heatmap Using CalPlot☆97Jan 25, 2021Updated 5 years ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Oct 3, 2020Updated 5 years ago
- ☆30Jul 29, 2021Updated 4 years ago
- ☆29Jan 15, 2017Updated 9 years ago
- A community collection of security reviews of open source software components.☆97Feb 29, 2024Updated 2 years ago
- IriusRisk Community☆71Sep 5, 2023Updated 2 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- AD Live changes viewer☆36Feb 25, 2023Updated 3 years ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- DupeKeyInjector☆134Apr 16, 2022Updated 3 years ago
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated 3 weeks ago
- ☆43Oct 27, 2022Updated 3 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Apr 2, 2021Updated 4 years ago
- This service provides authenticated access to a static website hosted in an s3 bucket.☆33Feb 25, 2023Updated 3 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Jan 22, 2022Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- A Clojure linter that enforces end-of-file newlines.☆11Jul 4, 2019Updated 6 years ago
- Smart Life API☆13Dec 6, 2017Updated 8 years ago
- A powerful, easy to use and intuitive way to create network analysis charts☆15Updated this week
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- Client-Side Prototype Pollution Tools☆87Sep 21, 2021Updated 4 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- A full insecure kubernetes application for testing security tools☆93Oct 23, 2025Updated 4 months ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Sep 23, 2020Updated 5 years ago
- sbomify is a product security artifact hub and a trust center.☆45Updated this week