Python script to exploit java unserialize on t3 (Weblogic)
☆61Aug 9, 2017Updated 8 years ago
Alternatives and similar repositories for loubia
Users that are interested in loubia are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Updated the FoxGlove Security WebLogic serialization exploit.☆31Mar 23, 2017Updated 9 years ago
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆35Mar 2, 2020Updated 6 years ago
- ☆128Oct 19, 2016Updated 9 years ago
- Python script to exploit CVE-2015-4852.☆31Jul 20, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A collection of curated Java Deserialization Exploits☆591May 16, 2021Updated 4 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 3 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 12 years ago
- An exploit for Apache Struts CVE-2017-5638☆442May 21, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- ☆502Mar 10, 2016Updated 10 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Central Repo for Burp extensions☆150Nov 18, 2021Updated 4 years ago
- java unserialize vul for weblogic exploit☆176Jul 20, 2018Updated 7 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- A static byte code analyzer for Java deserialization gadget research☆251Apr 17, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆55Jul 21, 2016Updated 9 years ago
- S2-057 poc test☆13Aug 31, 2018Updated 7 years ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 9 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 8 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- 反弹shell生成器☆17Jul 23, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- JNDI Attacking Tool☆246Jul 11, 2022Updated 3 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago