NotSoSecure / Blacklist3rLinks
project-blacklist3r
☆585Updated 6 months ago
Alternatives and similar repositories for Blacklist3r
Users that are interested in Blacklist3r are comparing it to the libraries listed below
Sorting:
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆361Updated 3 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆646Updated 8 months ago
- IOXIDResolver.py from AirBus Security☆257Updated last year
- JMX enumeration and attacking tool.☆467Updated 3 months ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆183Updated 3 years ago
- Java RMI Vulnerability Scanner☆894Updated last year
- A super small jsp webshell with file upload capabilities.☆309Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆609Updated 4 years ago
- A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)☆650Updated last year
- List DTDs and generate XXE payloads using those local DTDs.☆640Updated last year
- HopLa Burp Suite Extender plugin - Brings AI capabilities, autocompletion support, and a set of useful payloads to Burp Suite☆780Updated last month
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆933Updated 2 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆752Updated 4 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆739Updated 2 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆282Updated 2 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆271Updated 8 months ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆440Updated 3 years ago
- A tool to make socks connections through HTTP agents☆714Updated 4 years ago
- SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications☆1,011Updated last year
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆401Updated 5 years ago
- Log4Shell scanner for Burp Suite☆486Updated 2 years ago
- ☆169Updated 5 months ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆546Updated 4 years ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆366Updated last year
- ☆282Updated 3 years ago
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆229Updated 3 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆548Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆563Updated last month
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆390Updated 4 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆138Updated 5 years ago