0ang3el / Hibernate-Injection-Study
Study about HQL injection exploitation.
☆51Updated 8 years ago
Alternatives and similar repositories for Hibernate-Injection-Study:
Users that are interested in Hibernate-Injection-Study are comparing it to the libraries listed below
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- Another plugin for CRLF vulnerability detection☆26Updated 8 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆48Updated 4 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 8 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago
- DoS PoC's for SAP products☆50Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 4 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Updated 11 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- ☆42Updated 5 years ago
- Burp extension☆57Updated 6 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Updated 8 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago
- YSOSERIAL Integration with burp suite☆40Updated 3 years ago
- ☆34Updated 5 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆24Updated 8 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 3 years ago
- Utilities for creating Burp Suite Extensions.☆21Updated 5 months ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Updated 6 years ago