Identify vulnerable libraries in Maven dependencies
☆46Dec 14, 2022Updated 3 years ago
Alternatives and similar repositories for maven-security-versions
Users that are interested in maven-security-versions are comparing it to the libraries listed below
Sorting:
- ☆16Aug 2, 2018Updated 7 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- some java code i met or i used☆29May 7, 2019Updated 6 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆36Nov 15, 2024Updated last year
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Basic raw packet sniffer in Python - Cybrary☆12Nov 21, 2017Updated 8 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- pentest floating repo (based off git submodules), and some useful scripts i wrote☆35Aug 24, 2022Updated 3 years ago
- An HTTP proxy that naively injects NTLM data for the current user into outgoing requests☆14Nov 14, 2018Updated 7 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- 三方依赖库扫描系统☆91Jun 10, 2021Updated 4 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- PoC for wget v1.19.1☆52Feb 2, 2018Updated 8 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 3 years ago
- Reverse Shell as a Service☆66Nov 9, 2020Updated 5 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- FxCop rules that aim to help security audit on .NET applications.☆14Nov 10, 2017Updated 8 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- Stacktrace Clustering Library☆16May 20, 2012Updated 13 years ago
- ☆19Jan 25, 2016Updated 10 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- MCP Deobfuscate is a renaming tool suitable for obfuscation and deobfuscation of Java class files, and jar/zip bundles thereof.☆23Aug 14, 2013Updated 12 years ago
- Some codes for bypassing Oracle WebLogic CVE-2018-2628 patch☆114May 21, 2018Updated 7 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- CVE-2018-3252-PoC☆74Dec 7, 2018Updated 7 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Reveal.js theme for cleaver slides☆32Jan 25, 2017Updated 9 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆191May 17, 2016Updated 9 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Aug 5, 2013Updated 12 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Jan 14, 2019Updated 7 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- cross-platform 'say' command using Electron☆23Jul 28, 2015Updated 10 years ago