Python script to exploit java unserialize on t3 (Weblogic)
☆59Aug 9, 2017Updated 8 years ago
Alternatives and similar repositories for loubia
Users that are interested in loubia are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Updated the FoxGlove Security WebLogic serialization exploit.☆31Mar 23, 2017Updated 9 years ago
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆34Mar 2, 2020Updated 6 years ago
- ☆128Oct 19, 2016Updated 9 years ago
- Python script to exploit CVE-2015-4852.☆31Jul 20, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 10 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 4 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 12 years ago
- An exploit for Apache Struts CVE-2017-5638☆440May 21, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Java serializer in JavaScript☆81May 21, 2018Updated 7 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Windows Privesc Check☆19May 20, 2014Updated 11 years ago
- Central Repo for Burp extensions☆150Nov 18, 2021Updated 4 years ago
- java unserialize vul for weblogic exploit☆175Jul 20, 2018Updated 7 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- A static byte code analyzer for Java deserialization gadget research☆252Apr 17, 2017Updated 9 years ago
- S2-057 poc test☆13Aug 31, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 9 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 9 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆55Jul 21, 2016Updated 9 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- 反弹shell生成器☆17Jul 23, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- JNDI Attacking Tool☆246Jul 11, 2022Updated 3 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Java RMI enumeration and attack tool.☆742Sep 28, 2017Updated 8 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116May 17, 2019Updated 6 years ago