☆42Dec 1, 2023Updated 2 years ago
Alternatives and similar repositories for serialization-examples
Users that are interested in serialization-examples are comparing it to the libraries listed below
Sorting:
- Phar + JPG Polyglot generator and playground (CTF CODE)☆97Dec 13, 2018Updated 7 years ago
- ☆10Feb 22, 2023Updated 3 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- System Security Project☆13Feb 28, 2017Updated 9 years ago
- Deriving RSA public keys from message-signature pairs☆378Jan 30, 2026Updated last month
- Colored Cat is a syntax highlighter file reader.☆15Jun 21, 2024Updated last year
- ☆29Jan 10, 2023Updated 3 years ago
- Attack SQL Server through gopher protocol☆21Nov 22, 2021Updated 4 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 8 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- ☆20Apr 21, 2020Updated 5 years ago
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,768Sep 29, 2025Updated 5 months ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- Course enrolments allowed privilege escalation from teacher role into manager role to RCE☆44Aug 1, 2021Updated 4 years ago
- ☆139Nov 9, 2024Updated last year
- ☆12Jun 16, 2021Updated 4 years ago
- Burp Suite Configuration Tweak☆13Mar 15, 2024Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 10 months ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges☆57Oct 2, 2022Updated 3 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Python script that converts Grafana hash digests to PBKDF2_HMAC_SHA256 format in order to facilitate password cracking using Hashcat.☆26Oct 24, 2021Updated 4 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆91Sep 12, 2023Updated 2 years ago
- ☆11May 16, 2024Updated last year
- A simple way to setup IoT project using Arduino board and ESP8266.☆10Dec 1, 2016Updated 9 years ago
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- ☆43Mar 13, 2023Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- j4f☆14Apr 25, 2025Updated 10 months ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆28Feb 4, 2022Updated 4 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- An MCP server for pentesting. Contributors wanted!☆21Dec 5, 2025Updated 3 months ago
- Check AWS S3 instances for read/write/delete access☆121Feb 8, 2022Updated 4 years ago
- ☆56Aug 26, 2021Updated 4 years ago
- ☆17Apr 9, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago