NotSoSecure / Blacklist3rLinks
project-blacklist3r
☆577Updated 5 months ago
Alternatives and similar repositories for Blacklist3r
Users that are interested in Blacklist3r are comparing it to the libraries listed below
Sorting:
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆362Updated 3 years ago
- JMX enumeration and attacking tool.☆457Updated last month
- Java RMI Vulnerability Scanner☆888Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆633Updated 6 months ago
- IOXIDResolver.py from AirBus Security☆254Updated last year
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆182Updated 3 years ago
- A super small jsp webshell with file upload capabilities.☆303Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆606Updated 4 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆637Updated last year
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆749Updated 4 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆914Updated 2 years ago
- A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)☆635Updated last year
- HopLa Burp Suite Extender plugin - Brings AI capabilities, autocompletion support, and a set of useful payloads to Burp Suite☆767Updated last week
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆283Updated 2 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆736Updated 2 years ago
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆398Updated 5 years ago
- Log4Shell scanner for Burp Suite☆486Updated last year
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆437Updated 2 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆269Updated 6 months ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆382Updated 9 months ago
- A tool to make socks connections through HTTP agents☆714Updated 4 years ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆357Updated last year
- Retrieve LAPS password from LDAP☆418Updated 4 years ago
- SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications☆1,004Updated last year
- RCE 0-day for GhostScript 9.50 - Payload generator☆547Updated 3 years ago
- Extracts Key Values from .keytab files☆300Updated 4 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆387Updated 4 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆554Updated last week
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆229Updated 3 years ago
- ☆522Updated 2 years ago