Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)
☆177Dec 22, 2020Updated 5 years ago
Alternatives and similar repositories for dp_crypto
Users that are interested in dp_crypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆182Aug 22, 2020Updated 5 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆369Apr 14, 2022Updated 4 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆97Aug 14, 2018Updated 7 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆60Apr 1, 2026Updated last month
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A python-based padding oracle tool☆20Mar 31, 2026Updated last month
- Exploits targeting Symfony☆214Sep 19, 2024Updated last year
- IIS shortname scanner written in Go☆355Mar 25, 2023Updated 3 years ago
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 6 months ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,655Sep 3, 2023Updated 2 years ago
- ☆23Apr 21, 2022Updated 4 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Nov 12, 2019Updated 6 years ago
- Highlight Burp proxy requests made by different browsers☆29Sep 21, 2017Updated 8 years ago
- ☆810Jul 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Repository to store exploits created by Assetnotes Security Research team☆181Nov 7, 2023Updated 2 years ago
- Apache Solr Injection Research☆581Jan 28, 2020Updated 6 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,799Apr 26, 2024Updated 2 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 3 years ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆41Aug 12, 2023Updated 2 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,043Jun 3, 2021Updated 4 years ago
- ☆37Sep 12, 2018Updated 7 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆132Aug 14, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆204Feb 26, 2019Updated 7 years ago
- ViewState Payload Generator☆26Aug 17, 2018Updated 7 years ago
- SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications☆1,060Nov 26, 2023Updated 2 years ago
- ☆284Nov 12, 2021Updated 4 years ago
- project-blacklist3r☆641Oct 3, 2025Updated 7 months ago
- PoC for ManageEngine ADAudit Plus CVE-2022-28219☆45Jun 26, 2022Updated 3 years ago
- It's bloody scantastic☆239Jun 21, 2022Updated 3 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,165Apr 3, 2026Updated last month
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,152Apr 21, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆127Jan 19, 2023Updated 3 years ago
- Random utilities from my security projects that might be useful to others☆183Jan 26, 2025Updated last year
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆522Mar 11, 2022Updated 4 years ago
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆411Dec 24, 2022Updated 3 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE☆32Jun 5, 2020Updated 5 years ago
- Notes about attacking Jenkins servers☆2,093Jul 10, 2024Updated last year