java unserialize vulnerability payload
☆21Apr 20, 2019Updated 6 years ago
Alternatives and similar repositories for java_unserialize
Users that are interested in java_unserialize are comparing it to the libraries listed below
Sorting:
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Jan 22, 2016Updated 10 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Nov 17, 2017Updated 8 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116May 17, 2019Updated 6 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- udptunnel☆15Jun 3, 2015Updated 10 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Struts2 Vuls Scanner base perl script☆23Feb 11, 2016Updated 10 years ago
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- python audit tool 审计 注入 inject☆182Feb 25, 2016Updated 10 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Make XSS Great Again☆31Nov 29, 2019Updated 6 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- Educational Exploitable Web Application☆24Feb 9, 2016Updated 10 years ago
- fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java☆403Dec 16, 2022Updated 3 years ago
- CVE-2020-2551 POC to use in Internet☆22May 26, 2020Updated 5 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago