frohoff / ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
☆8,016Updated 11 months ago
Alternatives and similar repositories for ysoserial:
Users that are interested in ysoserial are comparing it to the libraries listed below
- The cheat sheet about Java Deserialization vulnerabilities☆3,073Updated last year
- ☆3,457Updated 2 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,886Updated 10 months ago
- Deserialization payload generator for a variety of .NET formatters☆3,345Updated 2 months ago
- Linux privilege escalation auditing tool☆5,834Updated last year
- Web application fuzzer☆6,090Updated 6 months ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,054Updated this week
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆2,985Updated last year
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,441Updated 5 years ago
- Windows Exploit Suggester - Next Generation☆4,344Updated this week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆6,769Updated this week
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,384Updated this week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,431Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,042Updated last year
- pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.☆3,691Updated last week
- ✍️ A curated list of CVE PoCs.☆3,370Updated 3 years ago
- Automatic SSRF fuzzer and exploitation tool☆3,107Updated last week
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,753Updated 3 years ago
- Monitor linux processes without root permissions☆5,251Updated 2 years ago
- Web path scanner☆12,640Updated 2 weeks ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,234Updated last year
- A swiss army knife for pentesting networks☆8,617Updated last year
- windows-kernel-exploits Windows平台提权漏洞集合☆8,233Updated 3 years ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,551Updated 2 months ago
- An OOB interaction gathering server and client library☆3,633Updated this week
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,601Updated 3 months ago
- Webshell && Backdoor Collection☆1,865Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,388Updated 4 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,616Updated 4 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,662Updated 3 weeks ago