hakivvi / ermirLinks
an Evil Java RMI Registry.
☆51Updated 2 years ago
Alternatives and similar repositories for ermir
Users that are interested in ermir are comparing it to the libraries listed below
Sorting:
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- ☆21Updated last month
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- ☆31Updated last year
- FireProx written in Go☆21Updated last year
- ☆27Updated 2 years ago
- PoC repository for CVE-2023-29007☆35Updated 2 years ago
- ☆26Updated 3 years ago
- Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆13Updated 2 years ago
- A list of weird comparison in SQL☆15Updated 3 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 4 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆45Updated 3 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆56Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆68Updated last year
- WordPress - Authenticated XXE (CVE-2021-29447)☆42Updated 4 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- ☆51Updated 3 years ago