BishopFox / ysoserial-bfView external linksLinks
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
☆34Feb 9, 2024Updated 2 years ago
Alternatives and similar repositories for ysoserial-bf
Users that are interested in ysoserial-bf are comparing it to the libraries listed below
Sorting:
- ☆10May 25, 2023Updated 2 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- Artifacts for the WOOT publication.☆18Oct 3, 2020Updated 5 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Aug 8, 2022Updated 3 years ago
- ☆21Sep 12, 2025Updated 5 months ago
- ☆56Aug 26, 2021Updated 4 years ago
- Your favourite chest/terminal bursting buddy!☆17Nov 27, 2021Updated 4 years ago
- A collection of PHP scripts useful for penetration testers working in a PHP environment.☆14Apr 4, 2016Updated 9 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- ☆22Nov 3, 2022Updated 3 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆99Sep 5, 2024Updated last year
- Attempt to connect to and dump all tables within a ServiceNow instance.☆20Jul 4, 2023Updated 2 years ago
- 该系列是从 2014 年到 2022 年的历史漏洞☆18Apr 3, 2023Updated 2 years ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆23Aug 7, 2024Updated last year
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 10 months ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- ☆25Jun 2, 2023Updated 2 years ago
- A natural evolution of Burp Suite's Repeater tool☆200Feb 9, 2024Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- A Simple PoC☆22May 24, 2024Updated last year
- Python code to Serialize and Unserialize java binary serialization format.☆30Jan 9, 2026Updated last month
- alibabacloud-cdn-tool-toa☆26Oct 17, 2024Updated last year
- ☆18Apr 26, 2021Updated 4 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Oct 19, 2023Updated 2 years ago
- We publish our challenge questions for everyone.☆94Mar 15, 2021Updated 4 years ago
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Apr 29, 2024Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated 11 months ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- mindmap created for tools can be used during analysis/investigation☆28Jan 4, 2017Updated 9 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Mar 29, 2021Updated 4 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated last year
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago