RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
☆447Sep 7, 2022Updated 3 years ago
Alternatives and similar repositories for rmiscout
Users that are interested in rmiscout are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- Java RMI Vulnerability Scanner☆917Jul 3, 2024Updated last year
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆110Oct 10, 2020Updated 5 years ago
- JMX enumeration and attacking tool.☆500Jun 26, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆661Feb 1, 2025Updated last year
- List DTDs and generate XXE payloads using those local DTDs.☆655Feb 21, 2024Updated 2 years ago
- attackRmi☆258Oct 14, 2020Updated 5 years ago
- MOGWAI LABS JMX exploitation toolkit☆205Mar 13, 2023Updated 3 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆770Feb 16, 2021Updated 5 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,170May 26, 2023Updated 2 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,079Jun 15, 2021Updated 4 years ago
- Apache Solr Injection Research☆581Jan 28, 2020Updated 6 years ago
- A tool to dump Java serialization streams in a more human readable form.☆1,068Jun 21, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A fake JDBC driver that allows OS command execution.☆126Oct 2, 2022Updated 3 years ago
- A malicious LDAP server for JNDI injection attacks☆76Nov 15, 2024Updated last year
- Notes about attacking Jenkins servers☆2,092Jul 10, 2024Updated last year
- Java Message Exploitation Tool☆511Jul 6, 2022Updated 3 years ago
- bypass JEP290 RaspHook code☆63Sep 21, 2020Updated 5 years ago
- A helpful Java Deserialization exploit framework.☆1,244Feb 17, 2025Updated last year
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆485Dec 9, 2020Updated 5 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆424Jul 27, 2022Updated 3 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- Weblogic coherence.jar RCE☆176May 10, 2020Updated 5 years ago
- ☆1,386Jul 2, 2020Updated 5 years ago
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,251Nov 2, 2022Updated 3 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆803Nov 7, 2021Updated 4 years ago
- A malicious LDAP server for JNDI injection attacks☆1,078Sep 28, 2023Updated 2 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆428May 31, 2022Updated 3 years ago
- .NET Project for Attacking vCenter☆557Nov 11, 2021Updated 4 years ago
- ODAT: Oracle Database Attacking Tool☆1,748Mar 31, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- Exploit for CVE-2020-3952 in vCenter 6.7☆278Apr 16, 2020Updated 5 years ago
- A tool to abuse Exchange services☆2,303Jun 10, 2024Updated last year
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- 利用链、漏洞检测工具☆375Jul 31, 2024Updated last year
- RMI 反序列化环境 一步步☆213Aug 31, 2020Updated 5 years ago