hakivvi / ermirLinks
an Evil Java RMI Registry.
☆51Updated 2 years ago
Alternatives and similar repositories for ermir
Users that are interested in ermir are comparing it to the libraries listed below
Sorting:
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- ☆32Updated last year
- ☆26Updated 3 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 4 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- ☆27Updated 2 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- FireProx written in Go☆21Updated last year
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36Updated 3 years ago
- ☆21Updated 3 months ago
- Copy as XMLHttpRequest BurpSuite extension☆32Updated 4 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 8 months ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Updated 4 years ago
- ☆64Updated 4 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆57Updated last year
- ☆28Updated 2 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- Query various sources for CVE proof-of-concepts☆52Updated 2 years ago