chipik / SAP_RECON
PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)
☆215Updated 4 years ago
Alternatives and similar repositories for SAP_RECON:
Users that are interested in SAP_RECON are comparing it to the libraries listed below
- SAP Gateway RCE exploits☆150Updated 4 years ago
- ☆116Updated 4 years ago
- cve-2020-0688☆322Updated last year
- CVE-2018-13379☆251Updated 5 years ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Updated 4 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆251Updated 2 months ago
- Everything you need about Burp Extension Generation☆152Updated 2 years ago
- An Out-of-Band XXE server for retrieving file contents over FTP.☆175Updated 4 years ago
- SQL Server Reporting Services(CVE-2020-0618)中的RCE☆198Updated 4 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆106Updated 4 years ago
- PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Or…☆95Updated 4 years ago
- Exporter is a Burp Suite extension to copy a request to a file or the clipboard as multiple programming languages functions.☆173Updated 3 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆350Updated 2 years ago
- MOGWAI LABS JMX exploitation toolkit☆198Updated last year
- ☆127Updated 3 years ago
- Java serialization brute force attack tool.☆124Updated 7 years ago
- ☆280Updated 3 years ago
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆103Updated 4 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆156Updated 3 years ago
- Exploit for WebSocket Vulnerability in Apache Tomcat☆165Updated 4 years ago
- ☆206Updated 3 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆424Updated 2 years ago
- ☆214Updated last year
- mRemoteNG Config File Decrypt☆83Updated 2 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆75Updated 7 years ago
- ☆127Updated 6 years ago
- Exploitation toolkit for RichFaces☆102Updated last year
- List of configuration files from WEB-INF and META-INF for use in Unvalidated Forwards and JSP Include vulnerabilities.☆81Updated 6 years ago
- Data extraction tool for Docker Registry API☆124Updated 11 months ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆177Updated 2 years ago