RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets from ysoserial.
☆110Oct 10, 2020Updated 5 years ago
Alternatives and similar repositories for RmiTaste
Users that are interested in RmiTaste are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆447Sep 7, 2022Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Several XStream gadgets ported from ysoserial☆33Sep 26, 2021Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- bypass JEP290 RaspHook code☆63Sep 21, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Windows Oracle Database Attack Toolkit☆81Jul 30, 2022Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- A malicious LDAP server for JNDI injection attacks☆76Nov 15, 2024Updated last year
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Web-based check for Windows privesc vulnerabilities☆139May 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- MOGWAI LABS JMX exploitation toolkit☆205Mar 13, 2023Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- POC for .NET mssql client for accessing database data through beacon☆64Sep 12, 2023Updated 2 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆57Sep 25, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆224Dec 5, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆156Jun 30, 2020Updated 5 years ago
- ☆113Aug 5, 2020Updated 5 years ago
- Pass the Hash to a named pipe for token Impersonation☆310Nov 29, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Java RMI Vulnerability Scanner☆918Jul 3, 2024Updated last year
- JMX enumeration and attacking tool.☆500Jun 26, 2025Updated 9 months ago
- Java RMI enumeration and attack tool.☆742Sep 28, 2017Updated 8 years ago
- ☆128Jun 19, 2020Updated 5 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆203Jul 14, 2021Updated 4 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,079Jun 15, 2021Updated 4 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 4 months ago