frohoff / appseccali-javaLinks
☆9Updated 10 years ago
Alternatives and similar repositories for appseccali-java
Users that are interested in appseccali-java are comparing it to the libraries listed below
Sorting:
- ☆12Updated 9 years ago
- Ptcoresec jeopardy style scoreboard☆23Updated 12 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Updated 10 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated 2 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- ☆20Updated 9 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Scanner for the SkeletonKey Malware☆29Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago
- ☆32Updated 9 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆23Updated 7 years ago
- ☆23Updated 10 years ago
- Windows Privesc Check☆20Updated 11 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Peach Fuzzer Web Frontend☆52Updated 4 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Updated 10 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Updated 8 years ago
- ☆10Updated 5 months ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago