BishopFox / rmiscoutLinks
RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
☆443Updated 3 years ago
Alternatives and similar repositories for rmiscout
Users that are interested in rmiscout are comparing it to the libraries listed below
Sorting:
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Updated 4 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆363Updated 3 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆653Updated 10 months ago
- A super small jsp webshell with file upload capabilities.☆314Updated 4 years ago
- ☆282Updated 4 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆183Updated 3 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆274Updated 10 months ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆223Updated 5 years ago
- MOGWAI LABS JMX exploitation toolkit☆206Updated 2 years ago
- ☆240Updated 6 years ago
- CVE-2018-13379☆254Updated 6 years ago
- A mini webserver with FTP support for XXE payloads☆339Updated last year
- cve-2020-0688☆329Updated 2 years ago
- JMX enumeration and attacking tool.☆481Updated 5 months ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆205Updated 2 years ago
- Apache Solr Injection Research☆580Updated 5 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆178Updated 5 years ago
- project-blacklist3r☆620Updated 2 months ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Updated 4 years ago
- Java deserialization exploitation lab.☆235Updated 6 years ago
- ☆215Updated 2 years ago
- Java RMI enumeration and attack tool.☆740Updated 8 years ago
- Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)☆178Updated 5 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆228Updated 5 years ago
- Everything you need about Burp Extension Generation☆157Updated 2 years ago
- ☆298Updated 5 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆346Updated 3 years ago
- An Out-of-Band XXE server for retrieving file contents over FTP.☆184Updated 5 years ago
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆370Updated 5 years ago