An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228
☆12Dec 12, 2021Updated 4 years ago
Alternatives and similar repositories for evil-rmi-server
Users that are interested in evil-rmi-server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- This software allows you to perform a deauth attack with an ESP8266 against selected networks. The ESP8266 is a cheap and easy to use Wi-…☆10Sep 28, 2023Updated 2 years ago
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 3 months ago
- Lightweight SMTP connection pool with clustering support, wait/release mechanism, connection lifecycle management, eager/lazy loading poo…☆12Sep 15, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Car digital instrument cluster☆14Feb 15, 2021Updated 5 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Persistent Bloom Filter☆12Jul 21, 2018Updated 7 years ago
- ☆16Aug 13, 2023Updated 2 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- ☆14Nov 18, 2024Updated last year
- Racing Car Dashboard☆14Aug 12, 2023Updated 2 years ago
- API for Asset Service☆14Aug 15, 2024Updated last year
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆28Oct 18, 2022Updated 3 years ago
- A tool that automates the mundane tasks of pentesting Android apps. It uses APKTool and Dex2Jar.☆11May 29, 2020Updated 5 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- ESP8266 Somfy RTS multi-channel remote☆10Apr 23, 2023Updated 2 years ago
- Key Privilege est une plateforme d'animation du reseau de distribution de pieces automobiles☆15Jan 4, 2022Updated 4 years ago
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 6 months ago
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- A tool written in both bash and python to parse doc/ drive links and collect secrets in those :)☆18Jul 7, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- Search Termux Commands and Guide in Termux !!☆12Apr 9, 2026Updated last week
- A snapshot of my Dracula themed polybar☆16Feb 25, 2020Updated 6 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Jul 9, 2020Updated 5 years ago
- buffer overflow exploits for simple c programs (64 bit)☆17Feb 10, 2020Updated 6 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- ☆11Aug 24, 2022Updated 3 years ago
- An hashing load-balancer for nginx☆76Aug 16, 2014Updated 11 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- A Linux Kernel module keylogger, so that we can log all the keystrokes no matter who is the user! 🧐☆12May 22, 2020Updated 5 years ago
- ☆18Feb 20, 2024Updated 2 years ago
- A data breach parser written in python☆22Aug 21, 2019Updated 6 years ago
- X-Platform bind shell in TypeScript!☆30Jul 11, 2025Updated 9 months ago
- Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading☆195Dec 13, 2021Updated 4 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year