Hydragyrum / evil-rmi-serverView external linksLinks
An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228
☆12Dec 12, 2021Updated 4 years ago
Alternatives and similar repositories for evil-rmi-server
Users that are interested in evil-rmi-server are comparing it to the libraries listed below
Sorting:
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 3 years ago
- ☆28Oct 18, 2022Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 7 months ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated last month
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Fitness OSINT Resources☆15Jul 21, 2023Updated 2 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- an Evil Java RMI Registry.☆51Feb 8, 2023Updated 3 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Mar 8, 2022Updated 3 years ago
- A tool that automates the mundane tasks of pentesting Android apps. It uses APKTool and Dex2Jar.☆11May 29, 2020Updated 5 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- A Cross-Platform Telegam Members Scraping and Adding Tool☆10May 27, 2021Updated 4 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- A single place for all my Threat Intel and OSINT tools and commands☆14Jul 16, 2025Updated 6 months ago
- Date picker for distant dates, such as birthday☆11Jan 4, 2023Updated 3 years ago
- Payload Maker ( Only For lazy people like me..!!! )☆11Jan 18, 2018Updated 8 years ago
- Lightweight SMTP connection pool with clustering support, wait/release mechanism, connection lifecycle management, eager/lazy loading poo…☆12Sep 15, 2024Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆53Jan 25, 2022Updated 4 years ago
- Tampermonkey Script - Amazon Giveaways☆15Dec 6, 2018Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Feb 26, 2022Updated 3 years ago
- Encript Marshal Python3 Only☆10Nov 8, 2022Updated 3 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Jul 2, 2021Updated 4 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- ☆15Nov 20, 2017Updated 8 years ago
- ☆14Nov 18, 2024Updated last year
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 11 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Selected code and data for The Online Books Page and related applications☆11Feb 1, 2026Updated last week
- VPN providers that can be used for both Privacy & OSINT.☆13Aug 15, 2024Updated last year