mwielgoszewski / jython-burp-apiLinks
Develop Burp extensions in Jython
☆178Updated 8 years ago
Alternatives and similar repositories for jython-burp-api
Users that are interested in jython-burp-api are comparing it to the libraries listed below
Sorting:
- YSOSERIAL Integration with burp suite☆165Updated 2 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Updated 7 years ago
- (Deprecated) HQLmap, Automatic tool to exploit HQL injections☆230Updated 5 years ago
- java unserialize vul for weblogic exploit☆175Updated 6 years ago
- CVE 2017-9805☆60Updated 4 years ago
- Web Input Vector Extractor Teaser☆132Updated 3 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 6 years ago
- A python3 program to filter Burp Suite log file.☆77Updated 9 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Updated 6 years ago
- a passive scanner based on Mitmproxy and Arachni☆111Updated 7 years ago
- St2-052☆55Updated 7 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆173Updated 8 years ago
- Central Repo for Burp extensions☆151Updated 3 years ago
- CVE-2018-2893-PoC☆103Updated 6 years ago
- st2-048☆40Updated 7 years ago
- S2-046-PoC☆112Updated 8 years ago
- NagaScan is a distributed passive scanner for Web application.☆90Updated 8 years ago
- ☆78Updated 9 years ago
- CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script☆139Updated 6 years ago
- AnyScan☆103Updated 4 years ago
- CVE-2018-7600 - Drupal 7.x RCE☆72Updated 7 years ago
- fixed msf module for cve-2017-7269☆135Updated 8 years ago
- some pentest scripts & tools by yaseng@uauc.net☆148Updated 5 years ago
- Spring messaging STOMP protocol RCE☆113Updated 7 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆291Updated 2 years ago
- CVE-2018-3245-PoC☆167Updated 3 years ago
- Script to test if a server is vulnerable to the JetLeak vulnerability☆144Updated 8 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆170Updated 9 years ago
- ☆231Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago