Identify vulnerable libraries in Maven dependencies
☆46Dec 14, 2022Updated 3 years ago
Alternatives and similar repositories for maven-security-versions
Users that are interested in maven-security-versions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 3 years ago
- A rule for the Maven enforcer plugin to check for vulnerable artifacts within a project.☆41Oct 13, 2020Updated 5 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆36Nov 15, 2024Updated last year
- FxCop rules that aim to help security audit on .NET applications.☆14Nov 10, 2017Updated 8 years ago
- Minimalist cheat sheet for developpers to write secure code☆54Jul 17, 2020Updated 5 years ago
- some java code i met or i used☆29May 7, 2019Updated 6 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- 三方依赖库扫描系统☆91Jun 10, 2021Updated 4 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CVE database store☆131Oct 19, 2020Updated 5 years ago
- pentest floating repo (based off git submodules), and some useful scripts i wrote☆36Aug 24, 2022Updated 3 years ago
- PoC for wget v1.19.1☆52Feb 2, 2018Updated 8 years ago
- A POC for the Java agent of Elastic APM☆12Mar 1, 2018Updated 8 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Axis2 RPC Shell☆14Sep 10, 2015Updated 10 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- A collection of published exploits and proof-of-concept code.☆20Dec 19, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 4 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Dec 2, 2016Updated 9 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 9 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- Basic raw packet sniffer in Python - Cybrary☆12Nov 21, 2017Updated 8 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Repository to showcase various configuration recipes with various technologies☆36Dec 16, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆191May 17, 2016Updated 9 years ago
- a simple wii homebrew application demonstrating a simple gba input viewer☆11Apr 22, 2016Updated 9 years ago
- Set of JavaDoc doclets for modern Java annotations APIs☆27Jul 11, 2014Updated 11 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago