breenmachine / JavaUnserializeExploits
☆133Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for JavaUnserializeExploits
- A Java serializer in JavaScript☆82Updated 6 years ago
- ☆128Updated 8 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆172Updated 8 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆104Updated 8 years ago
- ☆84Updated 7 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆56Updated 8 years ago
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆72Updated 10 years ago
- ☆45Updated 8 years ago
- ☆88Updated 3 years ago
- Pcap importer for Burp☆107Updated 3 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆173Updated 7 years ago
- (Deprecated) HQLmap, Automatic tool to exploit HQL injections☆225Updated 4 years ago
- ☆492Updated 8 years ago
- Spring messaging STOMP protocol RCE☆114Updated 6 years ago
- ☆77Updated 8 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆121Updated 9 years ago
- A webshell connection tool with customized WAF bypass payloads☆126Updated 6 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆121Updated 6 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 8 years ago
- Script to test if a server is vulnerable to the JetLeak vulnerability☆144Updated 8 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆68Updated 8 years ago
- Image size issues plugin for Burp Suite☆93Updated 6 years ago
- JavaPayload is a collection of pure Java payloads to be used for post-exploitation from pure Java exploits or from common misconfiguratio…☆119Updated 2 years ago