victims / victims-cve-dbLinks
CVE database store
☆132Updated 4 years ago
Alternatives and similar repositories for victims-cve-db
Users that are interested in victims-cve-db are comparing it to the libraries listed below
Sorting:
- Owasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications.☆144Updated 8 years ago
- ThreadFix is a software vulnerability management platform. This GitHub site is far out of date. Please go to www.threadfix.it for up-to-d…☆340Updated 2 years ago
- A tiny Java agent that blocks attacks against unsafe deserialization☆85Updated 7 years ago
- The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Scala and Groovy projects)☆21Updated last year
- Identify vulnerable libraries in Maven dependencies☆46Updated 2 years ago
- Custom security ruleset for the popular Java static analysis tool PMD.☆61Updated 9 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆188Updated 9 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 3 years ago
- Minion☆354Updated 6 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 6 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated last year
- Code Pulse is a real-time code coverage tool for penetration testing activities☆122Updated 2 years ago
- Yet Another Source Code Analyzer☆184Updated 3 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆152Updated 8 years ago
- Web Input Vector Extractor Teaser☆132Updated 3 years ago
- Python API security testing tool from OpenStack Security Group☆276Updated 5 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆190Updated 6 years ago
- WAF Research☆180Updated 3 years ago
- ☆58Updated 6 months ago
- A toolkit for building self-defending applications through real-time event detection and response☆282Updated 2 years ago
- CVE assignment documentation☆76Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- Tagging and annotation framework for scan data☆102Updated 6 years ago
- Resources for developers and security engineers to learn the ropes of application security☆97Updated 6 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated last week
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆107Updated 9 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- setroubleshootd xSports☆92Updated 8 years ago