BishopFox / rmiscoutLinks
RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
☆434Updated 2 years ago
Alternatives and similar repositories for rmiscout
Users that are interested in rmiscout are comparing it to the libraries listed below
Sorting:
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆601Updated 4 years ago
- MOGWAI LABS JMX exploitation toolkit☆202Updated 2 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆356Updated 3 years ago
- ☆282Updated 3 years ago
- A super small jsp webshell with file upload capabilities.☆300Updated 3 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- cve-2020-0688☆324Updated last year
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 4 months ago
- Java RMI enumeration and attack tool.☆734Updated 7 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆203Updated 2 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆576Updated 3 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆182Updated 3 years ago
- JMX enumeration and attacking tool.☆443Updated 3 months ago
- A mini webserver with FTP support for XXE payloads☆331Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆623Updated 4 months ago
- ntlm relay attack to Exchange Web Services☆333Updated 7 years ago
- Java deserialization exploitation lab.☆235Updated 6 years ago
- CVE-2018-13379☆252Updated 5 years ago
- Everything you need about Burp Extension Generation☆154Updated 2 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆631Updated last year
- ☆236Updated 6 years ago
- ☆296Updated 4 years ago
- JWT Support for Burp☆256Updated 2 weeks ago
- A collection of curated Java Deserialization Exploits☆593Updated 4 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆223Updated 5 years ago
- When MVC magic turns black☆292Updated 4 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆220Updated 4 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆749Updated 4 years ago
- XXE Out of Band Server.☆170Updated last year
- Standalone binaries for Linux/Windows of Impacket's examples☆730Updated last year