k3idii / DeserekLinks
Python code to Serialize and Unserialize java binary serialization format.
☆22Updated 3 weeks ago
Alternatives and similar repositories for Deserek
Users that are interested in Deserek are comparing it to the libraries listed below
Sorting:
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 6 months ago
- ysoserial.net docker image☆29Updated 10 months ago
- Recon scripts for Red Team and Web blackbox auditing☆25Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆46Updated 6 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 11 months ago
- Java archive implant toolkit.☆61Updated 3 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated last year
- Scripts that automate portions of pentests.☆52Updated this week
- Use WordPress pingback.ping to transfer files.☆17Updated last year
- ☆21Updated 2 months ago
- ☆28Updated last year
- ☆12Updated last year
- ☆37Updated last month
- ☆27Updated 2 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆30Updated 8 months ago
- A list of weird comparison in SQL☆15Updated 3 years ago
- ☆72Updated last week
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆20Updated last year
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Updated 3 years ago
- POC for DLL Proxying / Hijacking☆61Updated 2 months ago
- Make better use of the embedded browser that comes by default with Burp☆44Updated last year
- Review of AWAE.OSWE☆31Updated 3 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆64Updated this week
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆39Updated last month
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆33Updated 4 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆70Updated 4 months ago
- ☆13Updated 2 years ago