k3idii / DeserekLinks
Python code to Serialize and Unserialize java binary serialization format.
☆26Updated 3 months ago
Alternatives and similar repositories for Deserek
Users that are interested in Deserek are comparing it to the libraries listed below
Sorting:
- ysoserial.net docker image☆28Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 8 months ago
- Java archive implant toolkit.☆61Updated 5 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated last year
- ☆40Updated 4 months ago
- Exploits written while preparing for the OSED exam☆25Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Updated 3 years ago
- Recon scripts for Red Team and Web blackbox auditing☆26Updated 2 weeks ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated last year
- ☆21Updated last month
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆94Updated 2 months ago
- Scripts that automate portions of pentests.☆53Updated 2 months ago
- Use WordPress pingback.ping to transfer files.☆16Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆25Updated last year
- ☆13Updated last year
- ☆29Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated 10 months ago
- A small red team course☆39Updated 2 years ago
- ☆48Updated 8 months ago
- ☆13Updated 2 years ago
- A list of weird comparison in SQL☆15Updated 3 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- POC for DLL Proxying / Hijacking☆62Updated 4 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆41Updated 3 months ago
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- .NET deserialization hunter☆80Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago