Vulnerability scanner based on vulners.com search API
-
Updated
Jul 13, 2017 - Java
Vulnerability scanner based on vulners.com search API
The goal for this project is to implement the Microservice Architecture for educational purpose
Aggregation and Analysis of IT Security Vulnerabilities
Analyse Open Source dependencies in projects development. Aplication to analyse security and license aspects in Open Source project's dependencies, applicable to Java platform.
Old project. A Spring MVC web application with a XML configuration. Vulnerabilities are present.
Майнд-карта для совместного структурирования проблем с безопасностью веб-приложений и подборки решений для них.
Analyzes your Java Maven Project dependencies for security issues and technical debts (CVE/EOL/+).
It is an application that can test three Android app vulnerabilities (user enumeration, routing detection bypass, and deep link) that have been issued in 2020. The app has a built-in flag value like CTF. Find flags and try authenticating on MainActivity! You can proceed with vulnerability analysis using the android_issue_2020.apk file. If you wa…
Automatic Repair of Java Code with Timing Side-Channel Vulnerabilities
Focused on functionality when implementing security consequences with regard to formatted output and arithmetic operations in a program.
workshop for testing and learning common code vulnerabilities
SSL/TLS vulnerability research
🐛🗡️👩⚕️ eir is a tool to report system vulnerabilities 👩⚕️🗡️🐛
The task was to create a web application that has at least five different flaws from the OWASP top ten list. Written using Spring framework.
Confuzzion is a Java Virtual Machine (JVM) fuzzer generating Java programs to find bugs and vulnerabilities in the Java VM.
CVE 2021-44228 Proof-of-Concept. Log4Shell is an attack against Servers that uses vulnerable versions of Log4J.
A Jenkins plugin by Red Hat, to scan the dependency stack and give information related to vulnerabilities, popularity, maintainability, compatibility and more
Jenkins Plugin from Contrast Security
Gathers, enriches and publishes vulnerability information to a Kafka topic.
Add a description, image, and links to the vulnerabilities topic page so that developers can more easily learn about it.
To associate your repository with the vulnerabilities topic, visit your repo's landing page and select "manage topics."