Identify vulnerable libraries in Maven dependencies
☆46Dec 14, 2022Updated 3 years ago
Alternatives and similar repositories for maven-security-versions
Users that are interested in maven-security-versions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 3 years ago
- A rule for the Maven enforcer plugin to check for vulnerable artifacts within a project.☆41Oct 13, 2020Updated 5 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆37Nov 15, 2024Updated last year
- FxCop rules that aim to help security audit on .NET applications.☆14Nov 10, 2017Updated 8 years ago
- Minimalist cheat sheet for developpers to write secure code☆54Jul 17, 2020Updated 5 years ago
- some java code i met or i used☆29May 7, 2019Updated 7 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆175Jul 21, 2016Updated 9 years ago
- 三方依赖库扫描系统☆91Jun 10, 2021Updated 4 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- CVE database store☆131Oct 19, 2020Updated 5 years ago
- pentest floating repo (based off git submodules), and some useful scripts i wrote☆36Aug 24, 2022Updated 3 years ago
- PoC for wget v1.19.1☆52Feb 2, 2018Updated 8 years ago
- A POC for the Java agent of Elastic APM☆12Mar 1, 2018Updated 8 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Axis2 RPC Shell☆14Sep 10, 2015Updated 10 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 9 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- A collection of published exploits and proof-of-concept code.☆20Dec 19, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 4 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Dec 2, 2016Updated 9 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 9 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Repository to showcase various configuration recipes with various technologies☆36Dec 16, 2022Updated 3 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆191May 17, 2016Updated 9 years ago
- a simple wii homebrew application demonstrating a simple gba input viewer☆11Apr 22, 2016Updated 10 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Aug 5, 2013Updated 12 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆55Jun 15, 2018Updated 7 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago