as0ler / vecnaLinks
Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.
☆12Updated 3 years ago
Alternatives and similar repositories for vecna
Users that are interested in vecna are comparing it to the libraries listed below
Sorting:
- MobSF Remote code execution (via CVE-2024-21633)☆80Updated 2 years ago
- Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆13Updated 2 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 5 months ago
- ☆27Updated 2 years ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- ☆44Updated 3 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- an Evil Java RMI Registry.☆51Updated 3 years ago
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- ☆106Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated 3 months ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- Fortinet FortiClient EMS SQL Injection☆52Updated last year
- ☆43Updated 2 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated 3 months ago
- OpenSSH Pre-Auth Double Free CVE-2023-25136 POC☆47Updated 2 years ago
- ☆63Updated last year
- Python code to Serialize and Unserialize java binary serialization format.☆30Updated last month
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- ☆42Updated 2 months ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆67Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- This extension enhances Burp Suite by adding several UI and functional features, making it more user-friendly.☆73Updated last year
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆87Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 4 years ago
- A list of weird comparison in SQL☆15Updated 3 years ago