Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for java attack
attack
x
java
x
123 search results found
Wycheproof
⭐
2,678
Project Wycheproof tests crypto libraries against known attacks.
Rogue Jndi
⭐
918
A malicious LDAP server for JNDI injection attacks
Http Request Smuggler
⭐
914
Remote Method Guesser
⭐
746
Java RMI Vulnerability Scanner
Jyso
⭐
561
It can be either a JNDIExploit or a ysoserial.
Wahh_extras
⭐
517
The Web Application Hacker's Handbook - Extra Content
Barmie
⭐
414
Java RMI enumeration and attack tool.
Goiv
⭐
375
Automatic Api Attack Tool
⭐
345
Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an output.
Emvemulator
⭐
307
This Android app collects Mag-Stripe data and CVC3 codes from PayPass cards and emulates that information.
Http Script Generator
⭐
256
ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)
Jwt4b
⭐
226
JWT Support for Burp
Shiro 721
⭐
183
Shiro-721 RCE Via RememberMe Padding Oracle Attack
Notsoserial
⭐
149
Java Agent which mitigates deserialisation attacks by making certain classes unserializable
Androidtampering
⭐
141
Android library to protect your applications against tampering attacks.
Pokubot
⭐
138
Clash of Clans bot
Bluepot
⭐
123
Bluetooth Honeypot
Deautherdroid
⭐
106
Additional android app for SpaceHunn's ESP8266 DeAuther.
Topguw
⭐
106
A software to make easier some cracking GSM steps (known plaintext attack vector) https://www.youtube.com/watch?v=QG2iIxv5smw
Cve 2020 5398
⭐
82
💣 CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC
Android Mobilefacenet Mtcnn Faceantispoofing
⭐
76
Use tensorflow Lite on Android platform, integrated face detection (MTCNN), face anti spoofing (CVPR2019-DeepTreeLearningForZeroShotFaceAntispoof and face comparison (MobileFaceNet use InsightFace loss)
Attackrmi
⭐
64
attackRmi
Karmadetector
⭐
64
Android wireless karma attack detector
Enchantedfortress
⭐
57
A simple game about managing resources of a fortress. Distribute your workforce, survive demon attacks and find a way to stop demon threat.
Jss7 Attack Simulator
⭐
56
SS7 Attack Simulator based on RestComm's jss7
Android Clipboard Security
⭐
53
A project demonstrating a security hole In Android's API that allows any installed application to listen to changes to the clipboard (listen to everything that you copy and paste).
Nfcult
⭐
51
NFC Ultralight Toolkit
Attack Surface Detector Burp
⭐
50
The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Dota2dqn
⭐
47
This is a deep Q-network (reinforcement learning) AI for Dota 2
Exit_code_java
⭐
40
ExitCode - The Free, Open-Source, Desktop & Hacking Simulator Game.
Attack Surface Detector Cli
⭐
40
Jmxploit
⭐
39
A tool to analyse JMX API security level.
Fixmath
⭐
38
Android game: FixMath it's mathematical game in which your task is to fix math calculations.
Maloss
⭐
37
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
Adtool2
⭐
36
Acedcup
⭐
35
Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)
Attack Surface Detector Zap
⭐
35
The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Helepolis
⭐
35
Android based APT exploitation framework
Legendsofcodeandmagic
⭐
32
The code used to play matches in the LegendsOfCodeAndMagic contest
Safecontentresolver
⭐
32
A replacement for Android's ContentResolver that protects against the Surreptitious Sharing attack
Antibot
⭐
32
Lightweight BungeeCord plugin that aims to stop attacks on your server quickly and efficiently.
Blockingserver
⭐
31
Web Server that serves a single file and keeps the connection open until user releases it.
Injectionattackfilter
⭐
30
A java HttpServletRequestWrapper to guard against sql injection and xss attacks
Android Overlay Protection
⭐
30
This application attempts to detect android overlay attacks
Ddosdn
⭐
29
Mitigation and Detection of DDoS Attacks in Software Defined Networks
Geolog
⭐
29
Geolocation for SSH brute force attacks
Deserialize
⭐
28
Reach Entity Attributes
⭐
27
Library of entity attributes for armor, tools, potions, etc. to increase or decrease reach distance and attack range
Pen Test Automation
⭐
26
A framework for automating penetration testing using a plugin based architecture
Deface
⭐
25
A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.
Tamablefoxes
⭐
25
SpigotMC Plugin that gives you the ability to tame foxes!
Bitcoinjenforcerrules
⭐
24
Verifies Maven SHA1 hashes against a known list to deter dependency-chain attack vectors
Professos
⭐
23
PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach to improve the security of OpenID Connect implementations by systematically detecting vulnerabilities.
Joseph
⭐
22
Nsa Codebreaker 2019
⭐
21
NSA Codebreaker Challenge 2019 write-ups.
Ois Dos
⭐
21
Java Deserialization
Irc Botnet
⭐
21
Control and perform distributed denial-of-service attacks on computers through a Java-based IRC botnet.
Icewall
⭐
21
a lightweight application firewall
Springsecurity Jwt Vue Deom
⭐
20
A demonstration of stateless JWT authentication with Spring Security, Spring Boot and Vue js
Network Intrusion Detection System
⭐
19
Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R. Java is used to prepare DataSets. R is used implement a neural network. Weka is used for data cleaning.
Plantsvszombies Game
⭐
19
Cloak And Dagger
⭐
19
An overlay attack example
Champions
⭐
19
A Minecraft mod introducing elite mobs with enhanced stats and abilities
Cryptopals
⭐
18
Solutions to https://cryptopals.com problems
Townyflight
⭐
18
Flight plugin for Towny servers.
Project Blue Fist
⭐
17
BLE Edition of the original FistBump (portable WPA handshake grabber)
Iryrwarosh
⭐
17
My 2012 7DRL: I rule, you rule, we all rule old-school Hyrule.
Web Based Graphical Password Authentication System
⭐
17
Web Based Graphical Password Authentication System is a web based application that can be used in any system to allow users to sign up and log in using a different model other than the static passwords. In normal authentication systems, static passwords are used by users to get in the system but it is a known fact that static passwords are very easy to hack. Thus in this system, a user can select certain points in an image and use them as their password. They are immune to basic hacking techniqu
Attack Surface Analyzer
⭐
16
A tool for analyzing the attack surface of an application
Timingintrusiontool5000
⭐
16
A tool for performing network timing attacks on plaintext and hashed password authentication.
Java Web Vulnerabilities
⭐
16
Plattform to develop and experiment with existing java web attacks.
Joogle
⭐
16
A static analysis API for finding deserialization attack gadgets
Hashes
⭐
15
Cross-plataform tool that injects keys with the same hash code in order to test web applications against hash collision attacks.
Slimeboundmod
⭐
15
Slimebound character mod for Slay the Spire
Cyberattack Event Collector
⭐
15
Tool to collect cyber attack events that Norse tracks (http://map.norsecorp.com) and persist it into locally running MongoDB instance that can be later used for analysis
Jarppoison
⭐
14
A java project which performs arp poison attacks
Beefstrike
⭐
13
Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.
Futuretrust
⭐
12
FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Research and Innovation (Horizon 2020).
Aaspe
⭐
12
A set of modeling tools for security analysis (attack tree, attack impact) and a code generator to produce code for the seL4 platform from AADL models.
Androidgesturecrack
⭐
11
Cracks Android Screenlock Gesture Pattern using dictionary Attack
Java Saml Validator
⭐
11
Reference SAML assertion digital signature validator for Java
Securitytesting
⭐
10
Eclipse plugin suite providing integration with security testing tools.
Aes_padding_oracle_attack
⭐
10
Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).
Sonar Zap
⭐
10
Feed SonarQube with OWASP Zed Attack Proxy (ZAP) reports
Jdos
⭐
10
This is a DDOS program, fully written in Java.
Janus
⭐
10
A framework for automated search for independent-biclique attacks
Risk
⭐
10
Java program of the board game, Risk
Vulnerabilities
⭐
9
Vulnerability teaching showcase
Tapjacker
⭐
9
Android tapjacking quick PoC tool
Rtmpbee
⭐
9
RTMP Client to connect to a stream and used as a bee.
Isdc Ssh
⭐
9
Refactoring official website backend of ISDC(Sichuan University Information Security and Network Attack and Defense Community)
Sheepdog
⭐
9
Kangaroo Bot
⭐
8
https://en.wikipedia.org/wiki/Spaghetti_code#Ravio
Apereo Cas Attack
⭐
8
WIP: Demo for Attacking Apereo CAS
Talismanoptimizer
⭐
8
A talisman reforge optimizer for Skyblock.
Corelang
⭐
8
A probabilistic attack simulation language for the (abstract) IT domain
Denial Of App Attack
⭐
8
Denial-Of-App Attack
Access Brute Forcer
⭐
8
Android v7+ application to perform a dictionary brute force attack against a host.
Latestart7drl
⭐
7
My java applet entry into the 2011 seven day rougelike challange
Securibench Micro
⭐
7
Securibench Micro is a benchmark for static analysis tools for security.
Related Searches
Java Spring (21,350)
Java Spring Boot (11,982)
Java Video Game (8,093)
Java Gradle (8,072)
Java Docker (6,180)
Java Database (6,015)
Java Mysql (5,954)
Java Sdk (5,864)
Java Testing (5,814)
Javascript Java (5,468)
1-100 of 123 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.