hakivvi / ermirLinks
an Evil Java RMI Registry.
☆50Updated 2 years ago
Alternatives and similar repositories for ermir
Users that are interested in ermir are comparing it to the libraries listed below
Sorting:
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- ☆26Updated 3 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated 2 years ago
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆44Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated last year
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago
- ☆36Updated 5 months ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- ☆30Updated last year
- FireProx written in Go☆20Updated last year
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 4 years ago
- Utility for creating ZipSlip archives☆73Updated 2 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 3 years ago
- Gopher Tomcat Deployer☆48Updated 6 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆53Updated 10 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- ☆19Updated 3 months ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 5 months ago