BishopFox / rmiscoutLinks
RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
☆443Updated 3 years ago
Alternatives and similar repositories for rmiscout
Users that are interested in rmiscout are comparing it to the libraries listed below
Sorting:
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Updated 4 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆366Updated 3 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆654Updated 11 months ago
- ☆283Updated 4 years ago
- A super small jsp webshell with file upload capabilities.☆315Updated 4 years ago
- MOGWAI LABS JMX exploitation toolkit☆206Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆275Updated 11 months ago
- ☆241Updated 6 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆183Updated 3 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆224Updated 5 years ago
- cve-2020-0688☆329Updated 2 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆206Updated 2 years ago
- CVE-2018-13379☆254Updated 6 years ago
- A mini webserver with FTP support for XXE payloads☆340Updated last year
- JMX enumeration and attacking tool.☆482Updated 6 months ago
- ☆298Updated 5 years ago
- Apache Solr Injection Research☆581Updated 5 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Updated 4 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆346Updated 3 years ago
- Everything you need about Burp Extension Generation☆157Updated 2 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆180Updated 5 years ago
- ☆215Updated 2 years ago
- ☆574Updated 5 months ago
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆280Updated 4 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆264Updated 4 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆229Updated 5 years ago
- Exploitation toolkit for RichFaces☆106Updated 2 years ago
- ntlm relay attack to Exchange Web Services☆334Updated 7 years ago
- An Out-of-Band XXE server for retrieving file contents over FTP.☆184Updated 5 years ago