an Evil Java RMI Registry.
☆50Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for ermir
Users that are interested in ermir are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Mar 2, 2022Updated 4 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 4 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- A PoC executing shellcode in Dart☆15Jun 28, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- ☆20Jul 24, 2022Updated 3 years ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆14Oct 17, 2023Updated 2 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆80Jul 29, 2022Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆88Mar 2, 2022Updated 4 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Mar 19, 2021Updated 5 years ago
- Rusty Impersonate☆105Oct 15, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆56Jun 14, 2021Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- ☆44Mar 13, 2023Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆102Jul 22, 2021Updated 4 years ago
- CVSS (Common Vulnerability Scoring System) v3.1 Javascript calculator toolkit☆65Aug 23, 2024Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆32Feb 13, 2026Updated 2 months ago
- A nice and cobaltish neovim theme☆20Aug 24, 2023Updated 2 years ago
- Bash and ZSH integration for Impacket☆73Nov 6, 2025Updated 5 months ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A static byte code analyzer for Java deserialization gadget research☆252Apr 17, 2017Updated 9 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Apr 17, 2018Updated 8 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆60Apr 1, 2026Updated last month
- A tool for pointesters to find candies in SharePoint☆283Nov 4, 2022Updated 3 years ago
- ☆63Jan 2, 2024Updated 2 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago