Burp extension to perform Java Deserialization Attacks
☆216Feb 2, 2024Updated 2 years ago
Alternatives and similar repositories for JavaSerialKiller
Users that are interested in JavaSerialKiller are comparing it to the libraries listed below
Sorting:
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆799Nov 7, 2021Updated 4 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,172May 26, 2023Updated 2 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆591May 16, 2021Updated 4 years ago
- YSOSERIAL Integration with burp suite☆165Dec 16, 2022Updated 3 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- A static byte code analyzer for Java deserialization gadget research☆251Apr 17, 2017Updated 8 years ago
- Burp Extension for AWS Signing☆92Jan 10, 2025Updated last year
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- A DNS tunnel utilizing the Burp Collaborator☆103Oct 8, 2019Updated 6 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,135Dec 16, 2024Updated last year
- Burp Suite extension to passively scan for applications revealing server error messages☆64Dec 15, 2023Updated 2 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 3 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,796Dec 4, 2025Updated 3 months ago
- Java serialization brute force attack tool.☆123Aug 18, 2017Updated 8 years ago
- ☆231Nov 18, 2015Updated 10 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆53Dec 3, 2025Updated 3 months ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆522Mar 11, 2022Updated 4 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- Java deserialization exploitation lab.☆237Mar 1, 2019Updated 7 years ago
- This is a small extension to make graphql readable☆30Dec 14, 2018Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- Splunk Dashboard for CobaltStrike logs☆90Mar 16, 2021Updated 5 years ago
- ☆502Mar 10, 2016Updated 10 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago