Updated the FoxGlove Security WebLogic serialization exploit.
☆31Mar 23, 2017Updated 8 years ago
Alternatives and similar repositories for weblogic-serialization-exploit-updated
Users that are interested in weblogic-serialization-exploit-updated are comparing it to the libraries listed below
Sorting:
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Aug 9, 2017Updated 8 years ago
- This is a compilation of functions to simplify scripts to manage AD tasks☆10Apr 7, 2016Updated 9 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- CVE-2021-2109 && Weblogic Server RCE via JNDI☆31Jan 22, 2021Updated 5 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Subdomain enumeration tool, asynchronous dns packets, use pcap to scan 1600,000 subdomains in 1 second修复内存溢出等bug☆14Nov 25, 2023Updated 2 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆162Apr 11, 2017Updated 8 years ago
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago
- sqlmap tamper script for unicode escape inside json☆14Dec 20, 2018Updated 7 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 8 years ago
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Mar 9, 2017Updated 8 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- A quick and dirty way to bypass encrypted EPA to connect to a NetScaler Gateway☆20Oct 11, 2019Updated 6 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116May 17, 2019Updated 6 years ago
- Vulnerability as a service: showcasing CVS-2014-6271, a.k.a. Shellshock☆22Oct 8, 2019Updated 6 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- ☆501Mar 10, 2016Updated 9 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago