hakivvi / ermir
an Evil Java RMI Registry.
☆49Updated 2 years ago
Alternatives and similar repositories for ermir:
Users that are interested in ermir are comparing it to the libraries listed below
- Query various sources for CVE proof-of-concepts☆51Updated last year
- ☆26Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 2 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated last year
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- ☆30Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Updated 2 years ago
- FireProx written in Go☆19Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 3 months ago
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆43Updated 2 years ago
- ☆28Updated 2 years ago
- Utility for creating ZipSlip archives☆72Updated 2 years ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆23Updated 3 years ago
- Writeup of CVE-2020-15906☆47Updated 4 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 3 years ago
- ☆35Updated 3 months ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 2 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- Gopher Tomcat Deployer☆48Updated 6 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago