mandiant / route-sixty-sink
Link sources to sinks in C# applications.
☆144Updated 2 years ago
Alternatives and similar repositories for route-sixty-sink
Users that are interested in route-sixty-sink are comparing it to the libraries listed below
Sorting:
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilities☆73Updated 2 years ago
- A python script to merge multiple jar files for easier debugging via JD-Eclipse☆61Updated 2 years ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆88Updated 6 months ago
- Source Code Management Attack Toolkit☆218Updated 2 years ago
- Proof-of-concept code for various bugs☆110Updated 6 months ago
- Scalpel is a Burp extension for intercepting and rewriting HTTP traffic, either on the fly or in the Repeater using Python 3 scripts.☆59Updated 11 months ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆107Updated 4 years ago
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆89Updated last year
- Utility for creating ZipSlip archives☆72Updated 2 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆142Updated last year
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆174Updated 4 years ago
- Example Vulnerable .NET HTTP Remoting☆84Updated 6 years ago
- Repository to store exploits created by Assetnotes Security Research team☆178Updated last year
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆351Updated 3 years ago
- Finding Java gadget chains with CodeQL☆169Updated 4 months ago
- ☆192Updated 6 months ago
- Scans for .NET Deserialization Bugs in .NET Assemblies☆78Updated 5 months ago
- A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and Security Filtering☆113Updated 3 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆124Updated 4 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆57Updated last year
- ☆166Updated 3 years ago
- jws2pubkey tool☆38Updated 11 months ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆103Updated last year
- Atredis Partners Security Advisories☆55Updated 2 months ago
- ☆148Updated 3 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- ☆281Updated 3 years ago
- oauth-labs: an intentionally vulnerable set of OAuth 2.0 labs for security training and learning☆68Updated 5 months ago
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 2 years ago