metalnas / loubiaView external linksLinks
Python script to exploit java unserialize on t3 (Weblogic)
☆61Aug 9, 2017Updated 8 years ago
Alternatives and similar repositories for loubia
Users that are interested in loubia are comparing it to the libraries listed below
Sorting:
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Basic raw packet sniffer in Python - Cybrary☆12Nov 21, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Python script to exploit CVE-2015-4852.☆31Jul 20, 2016Updated 9 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- An exploit for Apache Struts CVE-2017-5638☆441May 21, 2018Updated 7 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Code snippets from my blog☆29Oct 13, 2025Updated 4 months ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆35Mar 2, 2020Updated 5 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 6 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 11 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- 反弹shell生成器☆17Jul 23, 2018Updated 7 years ago
- ☆128Oct 19, 2016Updated 9 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆56Apr 13, 2024Updated last year
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Central Repo for Burp extensions☆151Nov 18, 2021Updated 4 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- some java code i met or i used☆29May 7, 2019Updated 6 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- A static byte code analyzer for Java deserialization gadget research☆252Apr 17, 2017Updated 8 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆386Apr 16, 2022Updated 3 years ago
- ☆182Feb 21, 2022Updated 3 years ago