ZonkSec / weblogic-serialization-exploit-updated
Updated the FoxGlove Security WebLogic serialization exploit.
☆31Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for weblogic-serialization-exploit-updated
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Metasploit msfvenom Bash Completions Generator☆41Updated 8 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- Advanced XPath Injection Tool☆32Updated 9 years ago
- Verification tools for CVE-2016-1287☆32Updated 7 years ago
- ☆58Updated 7 years ago
- PHDAYS |||☆17Updated 11 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- ☆84Updated 8 years ago
- a simple portforwarder in ps1 with embeded c# code☆89Updated 6 years ago
- Generates anti-sandbox analysis HTA files without payloads☆118Updated 7 years ago
- ☆73Updated 7 years ago
- ☆27Updated 8 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆117Updated 5 years ago
- ☆29Updated 6 years ago
- ☆34Updated 8 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 5 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆71Updated 6 years ago
- ☆52Updated 10 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆64Updated 6 years ago