An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228
☆12Dec 12, 2021Updated 4 years ago
Alternatives and similar repositories for evil-rmi-server
Users that are interested in evil-rmi-server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- Date picker for distant dates, such as birthday☆11Jan 4, 2023Updated 3 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 3 months ago
- Lightweight SMTP connection pool with clustering support, wait/release mechanism, connection lifecycle management, eager/lazy loading poo…☆12Sep 15, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Car digital instrument cluster☆14Feb 15, 2021Updated 5 years ago
- ☆16Aug 13, 2023Updated 2 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Persistent Bloom Filter☆12Jul 21, 2018Updated 7 years ago
- ☆14Nov 18, 2024Updated last year
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- Racing Car Dashboard☆13Aug 12, 2023Updated 2 years ago
- API for Asset Service☆14Aug 15, 2024Updated last year
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆28Oct 18, 2022Updated 3 years ago
- A tool that automates the mundane tasks of pentesting Android apps. It uses APKTool and Dex2Jar.☆11May 29, 2020Updated 5 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- ESP8266 Somfy RTS multi-channel remote☆10Apr 23, 2023Updated 2 years ago
- Key Privilege est une plateforme d'animation du reseau de distribution de pieces automobiles☆15Jan 4, 2022Updated 4 years ago
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 5 months ago
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- A tool written in both bash and python to parse doc/ drive links and collect secrets in those :)☆18Jul 7, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- A snapshot of my Dracula themed polybar☆16Feb 25, 2020Updated 6 years ago
- Search Termux Commands and Guide in Termux !!☆12Apr 29, 2022Updated 3 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Jul 9, 2020Updated 5 years ago
- buffer overflow exploits for simple c programs (64 bit)☆17Feb 10, 2020Updated 6 years ago
- ☆11Aug 24, 2022Updated 3 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- An hashing load-balancer for nginx☆76Aug 16, 2014Updated 11 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- ☆18Feb 20, 2024Updated 2 years ago
- A Linux Kernel module keylogger, so that we can log all the keystrokes no matter who is the user! 🧐☆12May 22, 2020Updated 5 years ago
- Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading☆195Dec 13, 2021Updated 4 years ago
- A data breach parser written in python☆22Aug 21, 2019Updated 6 years ago
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 8 months ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year