noperator / CVE-2019-18935Links
RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.
☆356Updated 3 years ago
Alternatives and similar repositories for CVE-2019-18935
Users that are interested in CVE-2019-18935 are comparing it to the libraries listed below
Sorting:
- ☆282Updated 3 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆182Updated 3 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 4 months ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆174Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆601Updated 4 years ago
- project-blacklist3r☆562Updated 3 months ago
- Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)☆171Updated 4 years ago
- A super small jsp webshell with file upload capabilities.☆300Updated 3 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆259Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆434Updated 2 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆631Updated last year
- MOGWAI LABS JMX exploitation toolkit☆202Updated 2 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- jolokia-exploitation-toolkit☆291Updated 6 months ago
- CVE-2018-13379☆252Updated 5 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆623Updated 4 months ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆156Updated 4 years ago
- Everything you need about Burp Extension Generation☆154Updated 2 years ago
- ☆206Updated 4 years ago
- cve-2020-0688☆324Updated last year
- ☆214Updated 2 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆223Updated 5 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆220Updated 4 years ago
- ☆293Updated 11 months ago
- ☆129Updated 7 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- ☆384Updated 3 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆203Updated 2 years ago
- JMX enumeration and attacking tool.☆443Updated 3 months ago
- exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts☆163Updated last year