CLI tool for PKCS7 padding oracle attacks
☆142Feb 25, 2021Updated 5 years ago
Alternatives and similar repositories for pax
Users that are interested in pax are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆216Feb 3, 2023Updated 3 years ago
- ☆26Dec 8, 2025Updated 3 months ago
- ☆128May 22, 2023Updated 2 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆447Sep 7, 2022Updated 3 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆53Dec 3, 2025Updated 3 months ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- generate reverse shell from CLI for linux and Windows.☆248Sep 17, 2020Updated 5 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆591May 16, 2021Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- ☆28May 8, 2023Updated 2 years ago
- ☆102May 5, 2020Updated 5 years ago
- Telegram (v4.9.155353) was rendering file:// links + opening them via NSWorkspace.open -> code execution.☆36Dec 8, 2019Updated 6 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,432Jul 20, 2024Updated last year
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- Blazing fast, advanced Padding Oracle exploit☆267Dec 12, 2025Updated 3 months ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆557Mar 6, 2023Updated 3 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- An Insider Threat Toolkit☆156Dec 17, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- 基于领英的企业用户名收集☆13Feb 3, 2020Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago