elttam / publicationsLinks
☆162Updated 2 weeks ago
Alternatives and similar repositories for publications
Users that are interested in publications are comparing it to the libraries listed below
Sorting:
- HTML5 WebSocket message fuzzer☆147Updated 6 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Updated 12 years ago
- CVE-2018-13382☆147Updated 6 years ago
- CVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!☆226Updated 6 years ago
- Java serialization brute force attack tool.☆123Updated 8 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Updated 4 years ago
- ☆73Updated 7 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Updated 7 years ago
- CVE-2018-7600 Drupal RCE☆114Updated 7 years ago
- ☆54Updated 7 years ago
- DupeKeyInjector☆136Updated 3 years ago
- Python Web framework P0wner☆75Updated 12 years ago
- YSOSERIAL Integration with burp suite☆166Updated 2 years ago
- Security Research☆94Updated 3 months ago
- Cisco IOS SNMP RCE PoC☆250Updated 7 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Updated 6 years ago
- JWT fuzzer☆107Updated 7 years ago
- WebLogic Exploit☆142Updated 7 years ago
- Burp Suite Attack Selector Plugin☆60Updated 7 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Updated 8 years ago
- YSOSERIAL Integration with burp suite☆41Updated 3 years ago
- A Java serializer in JavaScript☆81Updated 7 years ago
- poison and relay NTLM credentials☆175Updated 6 years ago
- PoC for CVE-2019-19844(https://www.djangoproject.com/weblog/2019/dec/18/security-releases/)☆101Updated 5 years ago
- siberas JMX exploitation toolkit☆131Updated 2 years ago
- BSidesSF CTF 2019 release☆71Updated 2 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆83Updated 7 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆296Updated 2 years ago
- Automated Python Code Injection Tool☆88Updated 4 years ago
- None of the exploit code or research is my own but all available in public domain☆27Updated 6 years ago