☆33Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below
Sorting:
- Java every minor versions.☆74Apr 19, 2023Updated 2 years ago
- Spring messaging STOMP protocol RCE☆113Apr 12, 2018Updated 7 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Distinguish the site is used CDN☆18Nov 8, 2018Updated 7 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- https://jira.atlassian.com/browse/JRASERVER-69793☆10Sep 16, 2019Updated 6 years ago
- fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java☆403Dec 16, 2022Updated 3 years ago
- 总结一些渗透中值得关注的默认端口☆23May 19, 2016Updated 9 years ago
- SerialWriter is an incomplete implementation of Java serialization for study of Java deserialization vulnerabilities.☆104Feb 28, 2018Updated 8 years ago
- ☆17Apr 21, 2017Updated 8 years ago
- 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical da…☆26Dec 5, 2016Updated 9 years ago
- 演示dubbo rpc Apache commons collections 的Java序列化漏洞☆42Nov 13, 2015Updated 10 years ago
- CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC☆87Dec 15, 2022Updated 3 years ago
- Apache Log4j 1.2.X存在反序列化远程代码执行漏洞☆78Dec 25, 2019Updated 6 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- RCE Exploit PoC for XMLDecoder☆63Aug 1, 2013Updated 12 years ago
- ☆16Nov 10, 2018Updated 7 years ago
- Trigger automated Acunetix scans as part of your web application's build process☆32Aug 9, 2024Updated last year
- WEB 跨域postMessage() 漏 洞挖掘工具,基本原理:使用AJAX 获取页面代码,结合iframe 和data 协议构造测试环境,然后在iframe 下的window.onmessage 中插入hook 监控onmessage 的参数,最后通过能否被原来的onme…☆11Sep 13, 2016Updated 9 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 7 years ago
- YSOSERIAL Integration with burp suite☆41Feb 10, 2022Updated 4 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- 针对域名/页面的接口爬取,递归模式入库☆22Sep 18, 2019Updated 6 years ago
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- Ruby interface to cirt.net default passwords database☆19May 4, 2011Updated 14 years ago
- Keyboard Weak Password☆28Mar 29, 2016Updated 9 years ago
- PyCon 2015, example code☆11Sep 19, 2015Updated 10 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- ☆27Mar 6, 2021Updated 5 years ago
- ☆16Aug 31, 2018Updated 7 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Mar 24, 2017Updated 8 years ago
- 漏洞测试环境 - 方便写扫描器利用复现☆27Aug 12, 2019Updated 6 years ago
- a passive scanner based on Mitmproxy and Arachni☆108Aug 17, 2017Updated 8 years ago