hakivvi / ermirLinks
an Evil Java RMI Registry.
☆51Updated 2 years ago
Alternatives and similar repositories for ermir
Users that are interested in ermir are comparing it to the libraries listed below
Sorting:
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆29Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- ☆30Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- ☆27Updated 2 years ago
- ☆21Updated 2 months ago
- FireProx written in Go☆20Updated last year
- ☆26Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- A list of weird comparison in SQL☆15Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- PoC repository for CVE-2023-29007☆33Updated 2 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆13Updated 2 years ago
- Python Script to Exploit SpoolService/Printer Bug on Exchange - Thanks to @3xocyte☆19Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 4 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆54Updated 11 months ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- A script used to query the dehashed API and filter for more useful results☆17Updated 4 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- Automated compromise detection of the world's most popular packages☆16Updated last year
- Utility for creating ZipSlip archives☆74Updated 2 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆51Updated last year
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago