victims / maven-security-versions
Identify vulnerable libraries in Maven dependencies
☆46Updated 2 years ago
Alternatives and similar repositories for maven-security-versions:
Users that are interested in maven-security-versions are comparing it to the libraries listed below
- A tiny Java agent that blocks attacks against unsafe deserialization☆83Updated 7 years ago
- Maven plugin for integrating with HCL AppScan Source☆9Updated 2 weeks ago
- A rule for the Maven enforcer plugin to check for vulnerable artifacts within a project.☆40Updated 4 years ago
- Repository to showcase various configuration recipes with various technologies☆35Updated 2 years ago
- Deliberately vulnerable web application☆22Updated 7 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 9 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆188Updated 8 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Updated 10 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 2 years ago
- Serial Whitelist Application Trainer☆29Updated 5 years ago
- Jenkins Plugin from Contrast Security☆13Updated 8 months ago
- The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Scala and Groovy projects)☆21Updated last year
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- Java Deserialization☆26Updated 8 years ago
- Viewstate Hidden Control Enumerator☆17Updated 11 years ago
- Application Intrusion Detection projects☆19Updated 8 months ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- A static analysis API for finding deserialization attack gadgets☆38Updated 2 years ago
- Demo Application and Exploit☆35Updated 8 years ago
- ☆14Updated 5 years ago
- ☆14Updated last year
- A collection of pentest tools and resources targeting Hadoop environments☆35Updated 8 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated 11 months ago
- ☆9Updated 10 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 7 years ago
- A simple Java command-line utility to mirror the entire contents of VulnDB.☆44Updated 4 months ago
- A brute force program to test weak accounts configured to access a JMX Registry☆34Updated 8 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- Insecure web application used to test system security controls☆13Updated 3 months ago