0ang3el / HQLi-playgroundView external linksLinks
☆46May 15, 2016Updated 9 years ago
Alternatives and similar repositories for HQLi-playground
Users that are interested in HQLi-playground are comparing it to the libraries listed below
Sorting:
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Mar 24, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆72Sep 4, 2014Updated 11 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- ☆34Nov 4, 2018Updated 7 years ago
- 攻击Java Web应用-[Java Web安全]☆15Dec 9, 2020Updated 5 years ago
- ☆86Feb 28, 2017Updated 8 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆386Apr 16, 2022Updated 3 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java☆403Dec 16, 2022Updated 3 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Dec 3, 2025Updated 2 months ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- 从扫描器结果分离出的一些大公司泛解析ip列表☆60Jun 8, 2017Updated 8 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- ☆20Feb 28, 2018Updated 7 years ago
- HTTP.ninja☆151Sep 3, 2023Updated 2 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- A Java serializer in JavaScript☆81May 21, 2018Updated 7 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- ☆39Mar 21, 2021Updated 4 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- WooYun Fuzz 库☆111Feb 27, 2017Updated 8 years ago
- a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)☆22Aug 31, 2018Updated 7 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- Testing vulnerabilities in devices and routers connected to the Internet.☆63Nov 19, 2015Updated 10 years ago
- a passive scanner based on Mitmproxy and Arachni☆109Aug 17, 2017Updated 8 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- 3.8.x - 4.2.3 ForumRunner (vBulletin) exploit Proof of Concept☆38Jul 31, 2017Updated 8 years ago
- Reverse Shell as a Service☆66Nov 9, 2020Updated 5 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116May 17, 2019Updated 6 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- Safari local file reader☆122Oct 22, 2018Updated 7 years ago