mandiant / heyserialLinks
Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, and rule types
☆142Updated 2 years ago
Alternatives and similar repositories for heyserial
Users that are interested in heyserial are comparing it to the libraries listed below
Sorting:
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆127Updated 11 months ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- ☆148Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- ☆67Updated 6 years ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated 8 months ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- ☆116Updated 3 years ago
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- ☆90Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆66Updated last year
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆119Updated 3 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆112Updated 2 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆203Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Workshop given at Hack in Paris 2019☆122Updated last year
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- a deterministic finite automata ranker☆70Updated 3 years ago