georlav / objectmapLinks
A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.
☆24Updated 6 years ago
Alternatives and similar repositories for objectmap
Users that are interested in objectmap are comparing it to the libraries listed below
Sorting:
- HTTP Desync Attack☆28Updated 5 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆28Updated 8 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago
- ☆26Updated 4 years ago
- burp extender for fuzzing☆10Updated 6 years ago
- Some of my public exploits☆51Updated 4 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Updated 5 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- ☆72Updated 3 years ago
- Scans tcl for command injection☆36Updated 6 years ago
- Insecure Deserialization, PDF and lab☆18Updated 5 years ago
- A Python3 module to assist in fuzzing web applications☆57Updated last year
- ☆38Updated 5 years ago
- ☆25Updated last year
- A python-based padding oracle tool☆20Updated 11 months ago
- ☆13Updated 3 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 5 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆20Updated 4 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆44Updated 8 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 5 years ago