A brute force program to test weak accounts configured to access a JMX Registry
☆35Feb 1, 2017Updated 9 years ago
Alternatives and similar repositories for jmxbf
Users that are interested in jmxbf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- My collection of dockerfiles☆24Feb 15, 2016Updated 10 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- Execute DLL via the Excel.Application object's RegisterXLL() method☆22Apr 17, 2021Updated 4 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- AntiXSS for Java is a port of the Microsoft Anti-Cross Site Scripting (AntiXSS) v1.5 library for .NET applications. The library requires …☆16Jul 2, 2012Updated 13 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆36Nov 15, 2024Updated last year
- Java Message Exploitation Tool☆510Jul 6, 2022Updated 3 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Fileless web browser information extraction☆221Apr 23, 2018Updated 7 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Jun 10, 2016Updated 9 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14May 15, 2017Updated 8 years ago
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆55Jul 21, 2016Updated 9 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- JSON Beautifier for Burp written in Java☆42Nov 20, 2019Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Tool to pentest spark clusters☆32Jun 26, 2024Updated last year
- ☆39Jul 29, 2021Updated 4 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- ☆19Updated this week
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- ☆55May 30, 2017Updated 8 years ago