k3idii / DeserekLinks
Python code to Serialize and Unserialize java binary serialization format.
☆30Updated last month
Alternatives and similar repositories for Deserek
Users that are interested in Deserek are comparing it to the libraries listed below
Sorting:
- ysoserial.net docker image☆28Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆26Updated last month
- ☆21Updated 5 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- Java archive implant toolkit.☆61Updated 9 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆26Updated last year
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 5 months ago
- Make better use of the embedded browser that comes by default with Burp☆44Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- Use WordPress pingback.ping to transfer files.☆16Updated last year
- Webshell agent in aspx and php☆28Updated 2 months ago
- POC for DLL Proxying / Hijacking☆63Updated 8 months ago
- ☆94Updated last month
- Scripts that automate portions of pentests.☆57Updated last week
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated last year
- ☆42Updated 2 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 2 years ago
- A list of weird comparison in SQL☆15Updated 3 years ago
- an Evil Java RMI Registry.☆51Updated 3 years ago
- ☆27Updated 2 years ago
- ☆13Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Updated last year
- ☆27Updated 4 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated 3 months ago
- ☆48Updated 3 months ago