A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
☆37Feb 9, 2024Updated 2 years ago
Alternatives and similar repositories for ysoserial-bf
Users that are interested in ysoserial-bf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitie…☆65Jan 3, 2026Updated 3 months ago
- ☆24Oct 18, 2022Updated 3 years ago
- ☆30Jan 12, 2023Updated 3 years ago
- ☆10May 25, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆56Aug 26, 2021Updated 4 years ago
- Rebuild of portspoof in GO with additional features.☆30Apr 7, 2026Updated last week
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 5 years ago
- Sandbox samples and monitor them with kunai☆30Mar 3, 2026Updated last month
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- My security presentations☆29Aug 21, 2023Updated 2 years ago
- ☆22Nov 3, 2022Updated 3 years ago
- Utility for creating ZipSlip archives☆89Feb 9, 2023Updated 3 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆102Sep 5, 2024Updated last year
- linux权限维持脚本☆42Mar 4, 2025Updated last year
- A collection of PHP scripts useful for penetration testers working in a PHP environment.☆14Apr 4, 2016Updated 10 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 9 months ago
- 😴 关于不让我弟一直玩游戏,定时要求他休息才写的小玩意。☆10Sep 4, 2021Updated 4 years ago
- alibabacloud-cdn-tool-toa☆26Oct 17, 2024Updated last year
- Automatically exported from code.google.com/p/fuzzdb☆13Mar 23, 2015Updated 11 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Aug 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SWAT, a dynamic symbolic execution engine for Java Applications that uses ASM for on-the-fly byte code instrumentation.☆42Updated this week
- ☆18Mar 19, 2026Updated last month
- ☆18Apr 26, 2021Updated 4 years ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 11 months ago
- Python client and module for Vulnerability-Lookup.☆15Dec 9, 2025Updated 4 months ago
- ☆10Feb 8, 2024Updated 2 years ago
- ☆66Dec 9, 2021Updated 4 years ago
- 如何将Java反序列化Payload极致缩小☆71Jan 18, 2022Updated 4 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated last year
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- ☆21Sep 12, 2025Updated 7 months ago
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆135May 8, 2024Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆441Feb 16, 2026Updated 2 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Aug 5, 2023Updated 2 years ago