mogwailabs / jarjarbigsLinks
A python script to merge multiple jar files for easier debugging via JD-Eclipse
☆62Updated 2 years ago
Alternatives and similar repositories for jarjarbigs
Users that are interested in jarjarbigs are comparing it to the libraries listed below
Sorting:
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Updated 5 years ago
- Gopher Tomcat Deployer☆48Updated 7 years ago
- Exploitation toolkit for RichFaces☆106Updated 2 years ago
- A malicious LDAP server for JNDI injection attacks☆76Updated last year
- tetctf2020_amf_writeups☆23Updated 5 years ago
- Utility for creating ZipSlip archives☆80Updated 2 years ago
- Link sources to sinks in C# applications.☆150Updated 2 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆16Updated 2 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- ☆56Updated 4 years ago
- Compiled dataset of Java deserialization CVEs☆60Updated 5 years ago
- ☆60Updated 2 years ago
- Example Vulnerable .NET HTTP Remoting☆87Updated 6 years ago
- ☆119Updated 5 years ago
- Same Origin XSS challenge☆64Updated 3 years ago
- ☆170Updated 4 years ago
- ☆283Updated 4 years ago
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆107Updated 5 years ago
- jws2pubkey tool☆41Updated 6 months ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆109Updated 6 months ago
- ☆15Updated 4 years ago
- ☆148Updated 3 years ago
- Generating payloads to reverse shell in different contexts of java.☆50Updated 3 years ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Updated 4 years ago
- Authenticated SSRF in Grafana☆83Updated last year
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆129Updated 2 years ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Updated 4 years ago
- ☆65Updated 4 years ago
- ☆65Updated 5 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago