 gadgetinspector
 gadgetinspector 
 Vulnerability scanner
 Analyzes Java applications for potential deserialization gadget chains to help identify vulnerabilities and prioritize remediation.
A byte code analyzer for finding deserialization gadget chains in Java applications
1k stars
 26 watching
 220 forks
 
Language: Java 
last commit: over 4 years ago  Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | Tools for analyzing and exploiting vulnerabilities in Java deserialization vulnerabilities | 587 | 
|  | A Burp Suite Extender to identify Java Deserialization vulnerabilities in client requests and server responses. | 9 | 
|  | A tool for identifying potential vulnerabilities in websites by fetching known URLs and filtering out ones with open redirects or SSRF parameters. | 168 | 
|  | Analyzes C/C++ source code for security vulnerabilities and reports potential flaws. | 498 | 
|  | Analyzes Java bytecode to identify potential deserialization vulnerabilities. | 240 | 
|  | A plugin for detecting and exploiting vulnerabilities in Java deserialization | 775 | 
|  | An extension to Burp Suite that integrates Semgrep for vulnerability scanning and analysis | 88 | 
|  | A set of tools for gathering information and exploiting vulnerabilities in IBM Power Systems | 97 | 
|  | A tool used to identify and exploit security vulnerabilities in Java RMI endpoints | 841 | 
|  | Analyzes JavaScript package or local Node.js project for security vulnerabilities and provides detailed reports. | 367 | 
|  | A collection of tools for hackers and security researchers to explore vulnerabilities and test systems | 511 | 
|  | An extension for Burp Suite that scans for unknown classes of injection vulnerabilities using a novel approach | 643 | 
|  | Automated tool for scanning vulnerabilities in binaries using abstract interpretation and Ghidra support | 1,583 | 
|  | An application security testing tool for identifying vulnerabilities in PHP code | 333 | 
|  | A tool that scans websites for Log4j2 remote code execution vulnerabilities using multiple DNS log platforms and supports various scan types | 776 |