noperator / CVE-2019-18935Links
RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.
☆361Updated 3 years ago
Alternatives and similar repositories for CVE-2019-18935
Users that are interested in CVE-2019-18935 are comparing it to the libraries listed below
Sorting:
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆182Updated 3 years ago
- ☆282Updated 3 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆175Updated 5 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆271Updated 7 months ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆222Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆607Updated 4 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆643Updated 7 months ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆439Updated 3 years ago
- Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)☆173Updated 4 years ago
- project-blacklist3r☆581Updated 6 months ago
- A super small jsp webshell with file upload capabilities.☆307Updated 4 years ago
- ☆215Updated 2 years ago
- MOGWAI LABS JMX exploitation toolkit☆205Updated 2 years ago
- ☆206Updated 4 years ago
- jolokia-exploitation-toolkit☆299Updated 8 months ago
- ☆239Updated 6 years ago
- cve-2020-0688☆329Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆197Updated 7 years ago
- mRemoteNG Config File Decrypt☆86Updated 2 years ago
- ☆296Updated last year
- JMX enumeration and attacking tool.☆460Updated 2 months ago
- CVE-2018-13379☆252Updated 6 years ago
- CVE-2019-1388 UAC提权 (nt authority\system)☆190Updated 5 years ago
- ☆387Updated 4 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆223Updated 5 years ago
- ☆14Updated 5 years ago
- ☆407Updated 3 years ago
- Everything you need about Burp Extension Generation☆156Updated 2 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆204Updated 2 years ago
- iis6 exploit 2017 CVE-2017-7269☆89Updated 2 years ago