java unserialize vulnerability payload
☆21Apr 20, 2019Updated 6 years ago
Alternatives and similar repositories for java_unserialize
Users that are interested in java_unserialize are comparing it to the libraries listed below
Sorting:
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Jan 22, 2016Updated 10 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Nov 17, 2017Updated 8 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116May 17, 2019Updated 6 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- udptunnel☆15Jun 3, 2015Updated 10 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- Educational Exploitable Web Application☆24Feb 9, 2016Updated 10 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.☆16Apr 5, 2024Updated last year
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Jun 6, 2016Updated 9 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- asp命令执行webshell☆19Oct 27, 2014Updated 11 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- Struts2 Vuls Scanner base perl script☆23Feb 11, 2016Updated 10 years ago
- XSSing Your Way to Shell☆32Nov 17, 2015Updated 10 years ago