victims / victims-cve-db
CVE database store
☆132Updated 4 years ago
Alternatives and similar repositories for victims-cve-db:
Users that are interested in victims-cve-db are comparing it to the libraries listed below
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 2 years ago
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- ThreadFix is a software vulnerability management platform. This GitHub site is far out of date. Please go to www.threadfix.it for up-to-d…☆339Updated 2 years ago
- Owasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications.☆144Updated 8 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 9 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆188Updated 8 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆83Updated 7 years ago
- ☆132Updated 9 years ago
- Minion☆354Updated 6 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆106Updated 8 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- Web Input Vector Extractor Teaser☆132Updated 3 years ago
- Mass scanner for the Java serialize bug☆151Updated 6 years ago
- INACTIVE - Security Testing Tool☆106Updated 9 years ago
- WAF Research☆180Updated 2 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆152Updated 7 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆142Updated last month
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated this week
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated last year
- User, contributor and developer friendly vulnerability database☆129Updated 6 years ago
- ☆493Updated 9 years ago
- ☆34Updated 11 years ago
- Tainted PhantomJS☆53Updated 9 years ago
- Vulnerability Information Aggregator for CVEs☆120Updated 5 years ago
- Build scripts used to prepare self-contained packages of Arachni.☆13Updated 2 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago