liquidsec / pyOracle2Links
A python-based padding oracle tool
☆20Updated 10 months ago
Alternatives and similar repositories for pyOracle2
Users that are interested in pyOracle2 are comparing it to the libraries listed below
Sorting:
- ☆19Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 6 years ago
- ☆20Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- A Flexible Web Shell Client, Built on Electron☆13Updated 2 years ago
- RCE in NPM VSCode Extension☆20Updated 4 years ago
- Remote Java classpath enumeration via deserialization☆22Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Protect your servers with a secret header☆29Updated 5 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- ☆16Updated 2 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- CVE-2020-0688 PoC☆11Updated 7 months ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 5 years ago
- The official exploit code for LibreNMS v1.46 Remote Code Execution CVE-2018-20434☆9Updated 6 years ago
- ☆28Updated 7 years ago