ZonkSec / weblogic-serialization-exploit-updated
Updated the FoxGlove Security WebLogic serialization exploit.
☆31Updated 8 years ago
Alternatives and similar repositories for weblogic-serialization-exploit-updated:
Users that are interested in weblogic-serialization-exploit-updated are comparing it to the libraries listed below
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Metasploit msfvenom Bash Completions Generator☆42Updated 8 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆34Updated 8 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- PHDAYS |||☆17Updated 11 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- ☆58Updated 7 years ago
- ☆29Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆51Updated 6 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- Advanced XPath Injection Tool☆34Updated 9 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- ☆54Updated 2 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆52Updated 11 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆56Updated 8 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- ☆73Updated 7 years ago
- A sample bot for Cobalt Strike 3☆22Updated 8 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- ☆11Updated 6 years ago
- Covert Channels for C2 Server☆17Updated 9 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago