as0ler / vecnaLinks
Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.
☆12Updated 2 years ago
Alternatives and similar repositories for vecna
Users that are interested in vecna are comparing it to the libraries listed below
Sorting:
- Burp Extension to add additional functionality for pentesting websocket based applications☆95Updated last year
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆21Updated last week
- This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self…☆24Updated 3 years ago
- ☆27Updated 2 years ago
- MobSF Remote code execution (via CVE-2024-21633)☆80Updated last year
- NotSoCereal: A Deserialization exploit playground☆53Updated 3 years ago
- an Evil Java RMI Registry.☆50Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆29Updated last year
- Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆13Updated 2 years ago
- ☆27Updated 2 years ago
- ☆105Updated 2 years ago
- Exploits targeting vBulletin.☆76Updated 2 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆62Updated 2 months ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆55Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 5 months ago
- POC for DLL Proxying / Hijacking☆61Updated last month
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆38Updated 3 weeks ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- Automate converting webshells into reverse shells.☆69Updated 3 weeks ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆50Updated last year
- This extension enhances Burp Suite by adding several UI and functional features, making it more user-friendly.☆70Updated 7 months ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆2Updated last year
- Review of AWAE.OSWE☆31Updated 3 years ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Updated 2 years ago