mveytsman / dilettanteView external linksLinks
Maven central doesn't do SSL when serving you JARs. Dilettante is a MiTM proxy for exploiting that.
☆160Feb 6, 2025Updated last year
Alternatives and similar repositories for dilettante
Users that are interested in dilettante are comparing it to the libraries listed below
Sorting:
- ☆10Apr 11, 2023Updated 2 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 4 years ago
- A new Java decompiler☆17May 9, 2019Updated 6 years ago
- Nicer reflection.☆16Nov 25, 2025Updated 2 months ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- a tiny tool for swf hacking, just browse it:)☆243Mar 13, 2013Updated 12 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Web Information Gathering☆18Feb 23, 2015Updated 10 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 4 months ago
- CVE-2017-9506 - SSRF☆190Feb 14, 2022Updated 4 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 3 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Files of HotJava 1.0a2 & 1.0a3 (predecessor of Java)☆13Jan 16, 2020Updated 6 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- A framework for interacting with another JVM via reflection performed by an RMI server which is deployed by a Java Agent.☆12Aug 19, 2016Updated 9 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Apr 20, 2022Updated 3 years ago
- Obfuscation of Fickleties for the Java Virtual Machine - A dataset of wacky obfuscation scenarios☆27Oct 20, 2021Updated 4 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Convert Java bytecode to firm IR☆18Feb 20, 2017Updated 8 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 9 years ago
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Jun 11, 2019Updated 6 years ago
- It checks how secure the program you made is and shows how vulnerable your program is.☆20Apr 20, 2017Updated 8 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Gathers current reported online malicious websites and grabs the content for offline analyzing☆14Mar 9, 2019Updated 6 years ago