an Evil Java RMI Registry.
☆51Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for ermir
Users that are interested in ermir are comparing it to the libraries listed below
Sorting:
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- ☆21Jul 24, 2022Updated 3 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Apr 6, 2022Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆80Jul 29, 2022Updated 3 years ago
- ☆43Mar 13, 2023Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆89Mar 2, 2022Updated 4 years ago
- CVSS (Common Vulnerability Scoring System) v3.1 Javascript calculator toolkit☆67Aug 23, 2024Updated last year
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- Rusty Impersonate☆104Oct 15, 2025Updated 4 months ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆103Jul 22, 2021Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- A Python Obfuscator through AST modification☆27Nov 15, 2019Updated 6 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Jun 14, 2021Updated 4 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Apr 17, 2018Updated 7 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- ☆413Dec 14, 2023Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆157Mar 27, 2023Updated 2 years ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆32Feb 13, 2026Updated 2 weeks ago
- Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability☆85Mar 16, 2024Updated last year
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆14Oct 17, 2023Updated 2 years ago
- An authentication bypass using an alternate path or channel in Fortinet product☆14Oct 27, 2022Updated 3 years ago