NetSPI / JSONBeautifierLinks
JSON Beautifier for Burp written in Java
☆40Updated 5 years ago
Alternatives and similar repositories for JSONBeautifier
Users that are interested in JSONBeautifier are comparing it to the libraries listed below
Sorting:
- Webshell for Razor Syntax (C#)☆20Updated 8 years ago
- Kerberos TGS_REP cracker written in Golang☆56Updated 9 years ago
- PoC CVE-2020-6308☆36Updated 4 years ago
- BMC Bladelogic RSCD exploits including remote code execution - CVE-2016-1542, CVE-2016-1543, CVE-2016-5063☆20Updated 5 years ago
- ☆45Updated 5 years ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆33Updated 5 years ago
- Powershell SMBv3 Compression checker☆28Updated 2 years ago
- CVE-2019-15107 Webmin RCE (unauthorized)☆65Updated 6 years ago
- miscellaneous security research stuff☆37Updated 6 years ago
- Example Vulnerable .NET HTTP Remoting☆86Updated 6 years ago
- guest→system(UAC手动提权)☆74Updated 5 years ago
- Gogs CVEs☆79Updated 5 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)☆40Updated 5 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆76Updated 7 years ago
- ☆63Updated 6 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 6 years ago
- Vuln Liferay scanner & Exploit☆21Updated 5 years ago
- CVE-2019-0230 Exploit POC☆15Updated 5 years ago
- A Burp Extender plugin, that will take deserialized AMF objects and encode them in XML using the Xtream library☆28Updated 10 years ago
- Exports Kerberos KrbCred Tickets for use in Mimikatz/Beacon from a Kerberos CCache File☆90Updated 10 years ago
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Updated 4 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- CVE-2020-1938漏洞复现☆38Updated 5 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆47Updated last year
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- Citrix ADC Remote Code Execution☆84Updated 5 years ago
- Cobaltstrike Aggressor Scripts☆28Updated 8 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago