Place for random PoCs
☆18May 21, 2020Updated 5 years ago
Alternatives and similar repositories for Sploits
Users that are interested in Sploits are comparing it to the libraries listed below
Sorting:
- 个人用于在自动化挖掘gadget时,方便查找gadget chains中class所在jar包,以助于便捷审计测试gadget有效性的那么一个小工具。☆60Mar 25, 2020Updated 5 years ago
- GreHack 2021 CodeQL for Java workshop☆73Nov 19, 2021Updated 4 years ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Jul 12, 2021Updated 4 years ago
- ☆22Nov 3, 2022Updated 3 years ago
- 用来存储Cheetah的脚本文件☆12Mar 31, 2021Updated 4 years ago
- 漏洞盒子入驻企业列表爬虫☆14Jan 18, 2019Updated 7 years ago
- ☆22Aug 3, 2024Updated last year
- 在线cms识别|旁站|c段|信息泄露|工控|系统|物联网安全|cms漏洞扫描|nmap端口扫描|子域名获取|待续..☆10Apr 23, 2019Updated 6 years ago
- ☆12Nov 25, 2024Updated last year
- A tiny runtime hot patch tool for JAVA☆14Dec 22, 2024Updated last year
- Registry tracker☆17Apr 3, 2013Updated 12 years ago
- A pyhon script to do port scan via weblogic uuid☆10Oct 1, 2020Updated 5 years ago
- ☆11Nov 14, 2024Updated last year
- Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun l…☆21Feb 15, 2014Updated 12 years ago
- Ransomeware attack in linux☆15Aug 12, 2018Updated 7 years ago
- 个人使用的一款脚本提权扫描器☆19Sep 6, 2020Updated 5 years ago
- PPID Spoofing☆19Dec 26, 2020Updated 5 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 5 years ago
- Java After-Deserialization Attack☆79Apr 26, 2021Updated 4 years ago
- ☆54Sep 1, 2021Updated 4 years ago
- A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692☆35Nov 7, 2022Updated 3 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- 从zoomeye or shodan or file 获取目标进行攻击。☆17Nov 21, 2019Updated 6 years ago
- A malicious LDAP server for JNDI injection attacks☆76Nov 15, 2024Updated last year
- masscan cgo demo☆20Jul 23, 2021Updated 4 years ago
- This is a backup of the unmodified version of ShadowVPN☆10Jan 2, 2016Updated 10 years ago
- attackRmi☆258Oct 14, 2020Updated 5 years ago
- WebSocket shell☆14Nov 29, 2020Updated 5 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated 2 months ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- An In-kernel Transparent Monitoring System for Microservice Systems with eBPF☆22Sep 11, 2022Updated 3 years ago
- ☆25Aug 11, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/burp-extensions☆10Feb 18, 2020Updated 6 years ago
- 小程序登陆包加解密☆45Apr 23, 2021Updated 4 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Aug 5, 2013Updated 12 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago