Contrast-Security-OSS / jinfinityLinks
An API for consuming all the memory of Java apps using deserialization
☆28Updated 9 years ago
Alternatives and similar repositories for jinfinity
Users that are interested in jinfinity are comparing it to the libraries listed below
Sorting:
- Some kernel exploit i wrote☆75Updated 10 years ago
- ☆78Updated 6 years ago
- Juniper backdoor☆14Updated 9 years ago
- .NET WPF Framework☆20Updated 8 years ago
- Hackerone disclosed report URL Aggregator☆30Updated 6 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 8 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Updated 6 years ago
- Automatic XSS filter bypass☆90Updated 10 years ago
- Demo Application and Exploit☆35Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 8 years ago
- ☆133Updated 9 years ago
- A malware/botnet analysis framework written in Ruby.☆197Updated 2 years ago
- Exploits and research stuffs☆55Updated 3 weeks ago
- based on search engine and get the valid infomation to test the vulnerability☆16Updated 9 years ago
- Peach Fuzzer Web Frontend☆51Updated 4 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- A php webshell run under linux based webservers. v0.05☆47Updated 10 years ago
- Faraday Continuous Scanning☆34Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 11 years ago
- Customizable lazy exploit pattern utility.☆13Updated 3 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- 一次通过 DNS 来实现部分区域 XSS 防护的简单尝试。☆11Updated 9 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- A Swiss Army Knife for Windows Exploit Development.☆40Updated 9 years ago
- IronBee Rules☆18Updated 11 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago