joaomatosf / jexboss
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
☆2,435Updated 4 years ago
Alternatives and similar repositories for jexboss:
Users that are interested in jexboss are comparing it to the libraries listed below
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,850Updated 8 months ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,577Updated last month
- The cheat sheet about Java Deserialization vulnerabilities☆3,053Updated last year
- HackBar plugin for Burpsuite☆1,560Updated 3 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,040Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,005Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆2,929Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,375Updated 3 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,730Updated 2 years ago
- ODAT: Oracle Database Attacking Tool☆1,634Updated 5 months ago
- Automatic SSRF fuzzer and exploitation tool☆3,051Updated 7 months ago
- TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.☆1,579Updated 7 months ago
- Webshell && Backdoor Collection☆1,851Updated 4 years ago
- Next-Generation Linux Kernel Exploit Suggester☆1,873Updated last year
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,839Updated 4 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆806Updated 7 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆2,980Updated 5 months ago
- Rip web accessible (distributed) version control systems: SVN/GIT/HG...☆1,715Updated 5 months ago
- MS17-010☆2,157Updated last year
- Vulnerability Labs for security analysis☆1,162Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,358Updated last week
- Linux privilege escalation auditing tool☆5,739Updated 11 months ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,475Updated 3 years ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,682Updated this week
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,711Updated 3 years ago
- Linux Exploit Suggester; based on operating system release number☆1,780Updated 10 years ago
- Simple reverse ICMP shell☆1,565Updated 6 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,599Updated 2 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,482Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,040Updated 2 months ago