k3idii / DeserekLinks
Python code to Serialize and Unserialize java binary serialization format.
☆30Updated this week
Alternatives and similar repositories for Deserek
Users that are interested in Deserek are comparing it to the libraries listed below
Sorting:
- Recon scripts for Red Team and Web blackbox auditing☆25Updated last month
- ysoserial.net docker image☆28Updated last year
- ☆41Updated 2 weeks ago
- php7.4.26-internalog☆13Updated 3 years ago
- Java archive implant toolkit.☆61Updated 7 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆24Updated last year
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Updated 3 years ago
- ☆29Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Use WordPress pingback.ping to transfer files.☆16Updated last year
- ☆13Updated 2 years ago
- ☆91Updated last month
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 10 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆102Updated 3 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆24Updated last year
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆35Updated last month
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated last year
- ☆13Updated last year
- Webshell agent in aspx and php☆26Updated last month
- Scripts that automate portions of pentests.☆55Updated 3 months ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated last year
- ☆21Updated 2 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆41Updated 5 months ago
- Proof Of Concepts☆54Updated 4 months ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Updated last year
- Exploits written while preparing for the OSED exam☆26Updated last year
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- LLM-based automated patch diffing☆85Updated 2 months ago