mogwailabs / jarjarbigsLinks
A python script to merge multiple jar files for easier debugging via JD-Eclipse
☆62Updated 2 years ago
Alternatives and similar repositories for jarjarbigs
Users that are interested in jarjarbigs are comparing it to the libraries listed below
Sorting:
- Exploitation toolkit for RichFaces☆106Updated 2 years ago
- A malicious LDAP server for JNDI injection attacks☆76Updated last year
- Gopher Tomcat Deployer☆48Updated 7 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆108Updated 5 years ago
- tetctf2020_amf_writeups☆23Updated 4 years ago
- Link sources to sinks in C# applications.☆150Updated 2 years ago
- Utility for creating ZipSlip archives☆79Updated 2 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆108Updated 5 months ago
- Example Vulnerable .NET HTTP Remoting☆87Updated 6 years ago
- ☆119Updated 5 years ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Updated 4 years ago
- Generating payloads to reverse shell in different contexts of java.☆49Updated 3 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆178Updated 5 years ago
- Compiled dataset of Java deserialization CVEs☆60Updated 5 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- ☆60Updated 2 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆16Updated 2 years ago
- ☆169Updated 4 years ago
- ☆56Updated 4 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago
- Same Origin XSS challenge☆64Updated 3 years ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Updated 4 years ago
- Catalogue de payloads destinés au téléversement de fichiers. Il s'agit d'un ensemble de plusieurs fichiers contenant du code malveillant …☆41Updated last year
- ☆15Updated 4 years ago
- ☆65Updated 5 years ago
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆106Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆30Updated 3 years ago
- DupeKeyInjector☆135Updated 3 years ago
- ☆148Updated 3 years ago