joaomatosf / jexboss
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
☆2,460Updated 5 years ago
Alternatives and similar repositories for jexboss:
Users that are interested in jexboss are comparing it to the libraries listed below
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,625Updated 5 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,929Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,066Updated 2 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,813Updated 3 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,099Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,398Updated 6 months ago
- Rip web accessible (distributed) version control systems: SVN/GIT/HG...☆1,729Updated 9 months ago
- HackBar plugin for Burpsuite☆1,566Updated 4 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,077Updated 2 months ago
- Automatic SSRF fuzzer and exploitation tool☆3,188Updated 2 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,052Updated 9 months ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,515Updated last year
- A tool for embedding XXE/XML exploits into different filetypes☆1,077Updated 4 months ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,062Updated 2 years ago
- DNS Enumeration Script☆2,763Updated last week
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆810Updated 7 years ago
- Webshell && Backdoor Collection☆1,888Updated 5 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,865Updated 4 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,403Updated 4 months ago
- MS17-010☆2,189Updated last year
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,639Updated 4 months ago
- ODAT: Oracle Database Attacking Tool☆1,665Updated 9 months ago
- Linux Exploit Suggester; based on operating system release number☆1,787Updated 10 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,787Updated 3 years ago
- Simple reverse ICMP shell☆1,584Updated 7 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,284Updated 6 months ago
- Vulnerability Labs for security analysis☆1,170Updated 4 years ago
- A python script that finds endpoints in JavaScript files☆3,934Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,558Updated 3 years ago
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,458Updated 3 weeks ago