Starred repositories
10
stars
written in Java
Clear filter
Logstash - transport and process your logs, events, or other data
Vulnerable app with examples showing how to not use secrets
Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an output.
Programming secure connections in Python and Java
A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x "JNDI LDAP" vulnerability.