hakivvi / ermir
an Evil Java RMI Registry.
☆47Updated 2 years ago
Alternatives and similar repositories for ermir:
Users that are interested in ermir are comparing it to the libraries listed below
- Utility for creating ZipSlip archives☆69Updated 2 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 2 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated last year
- tool that generates bypasses for open redirects☆51Updated 2 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- ☆38Updated 2 years ago
- Copy as XMLHttpRequest BurpSuite extension☆30Updated 3 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- ☆26Updated 2 years ago
- Gopher Tomcat Deployer☆47Updated 6 years ago
- PoC repository for CVE-2023-29007☆33Updated last year
- ☆29Updated 9 months ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆33Updated last month
- client-side prototype pullution vulnerability scanner☆46Updated 3 years ago
- Simple WebSocket fuzzer☆31Updated last year
- ☆25Updated 8 months ago
- Query various sources for CVE proof-of-concepts☆49Updated last year
- Writeup of CVE-2020-15906☆46Updated 4 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Updated 2 years ago
- Exploit for Microsoft SharePoint 2019☆14Updated last year
- ☆45Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated last year
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆46Updated 5 months ago
- ManageEngine PAM360, Password Manager Pro, and Access Manager Plus unauthenticated remote code execution vulnerability PoC-exploit☆28Updated 2 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆75Updated 4 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 2 years ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆12Updated 2 years ago