Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)
☆38Apr 14, 2016Updated 9 years ago
Alternatives and similar repositories for ACEDcup
Users that are interested in ACEDcup are comparing it to the libraries listed below
Sorting:
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Jan 22, 2016Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Script to find exploitable magic methods for PHP object injection☆27Dec 4, 2014Updated 11 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- ☆17Nov 25, 2015Updated 10 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- XXE OOB Exploitation Toolset for Automation☆63Jan 20, 2014Updated 12 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Dec 10, 2015Updated 10 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Scan networks for HTTP servers, do stuff when you find them.☆13Sep 11, 2017Updated 8 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Mar 24, 2017Updated 8 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago