Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpickle module is used for deserialization of serialized data. I will update it with more attack vectors to targets other modules.
☆129Nov 25, 2023Updated 2 years ago
Alternatives and similar repositories for python-deserialization-attack-payload-generator
Users that are interested in python-deserialization-attack-payload-generator are comparing it to the libraries listed below
Sorting:
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- This is a basic bind shell script , containting both server and client classes, i will upgrade it with time adding new features and make …☆13Jun 11, 2025Updated 9 months ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- Find .net assemblies locally☆133Oct 14, 2022Updated 3 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated 3 weeks ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆80Jul 29, 2022Updated 3 years ago
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated last month
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- Exploiting CVE-2021-44228 in vCenter for remote code execution and more.☆107Dec 22, 2021Updated 4 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.