☆28Oct 16, 2017Updated 8 years ago
Alternatives and similar repositories for java_vul_target
Users that are interested in java_vul_target are comparing it to the libraries listed below
Sorting:
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- CVE-2017-0213 for command line☆58Jul 1, 2017Updated 8 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- browser_vuln_check ,利用已知的浏览器漏洞PoC 来快速检测Webview 和浏览器环境是否存在安全漏洞,只需要访问run.html 即可获取所有扫描结果,适用场景包含:APP 发布之前的内部安全测试,第三方Webview 漏洞检测等(browser_vu…☆118Aug 16, 2017Updated 8 years ago
- ☆14May 13, 2018Updated 7 years ago
- Spring messaging STOMP protocol RCE☆113Apr 12, 2018Updated 7 years ago
- Trigger automated Acunetix scans as part of your web application's build process☆32Aug 9, 2024Updated last year
- ☆72Nov 20, 2017Updated 8 years ago
- a passive scanner based on Mitmproxy and Arachni☆108Aug 17, 2017Updated 8 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- PoC for wget v1.19.1☆52Feb 2, 2018Updated 8 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆520Mar 11, 2022Updated 3 years ago
- st2-048☆40Jul 7, 2017Updated 8 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- 数据库安全审计平台☆64Oct 31, 2018Updated 7 years ago
- acunetix☆62Mar 27, 2020Updated 5 years ago
- Zabbix Jsrpc.php Injection Exploit☆25Aug 29, 2016Updated 9 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- List of configuration files from WEB-INF and META-INF for use in Unvalidated Forwards and JSP Include vulnerabilities.☆84Mar 23, 2018Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- A DNS tunnel utilizing the Burp Collaborator☆103Oct 8, 2019Updated 6 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆72Sep 4, 2014Updated 11 years ago
- cve-2014-0130 rails directory traversal vuln☆19May 15, 2017Updated 8 years ago
- ☆22Oct 13, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 8 years ago
- ☆33Dec 6, 2022Updated 3 years ago
- SecurityPaper For www.polaris-lab.com☆104Mar 13, 2019Updated 6 years ago
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆386Apr 16, 2022Updated 3 years ago
- XSS_Filter_Evasion_Cheat_Sheet 中文版☆126May 18, 2014Updated 11 years ago