omerlh / insecure-deserialisation-net-pocView external linksLinks
A small webserver vulnerable to insecure deserialization
☆20Nov 30, 2017Updated 8 years ago
Alternatives and similar repositories for insecure-deserialisation-net-poc
Users that are interested in insecure-deserialisation-net-poc are comparing it to the libraries listed below
Sorting:
- WStalker: an easy proxy☆25May 5, 2020Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- Experimental Windows .text section Patch Detector☆22Jan 26, 2015Updated 11 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.☆46Aug 20, 2025Updated 5 months ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 4 years ago
- ARP poison and sniff with DNS spoofing, urlsnarf, driftnet, ferret, dsniff, sslstrip and tcpdump☆25Jan 12, 2015Updated 11 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- Demo Application and Exploit☆35Mar 13, 2017Updated 8 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Oct 9, 2021Updated 4 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Jan 31, 2019Updated 7 years ago
- ☆10Mar 11, 2024Updated last year
- vscode-extension-highlight☆14Jul 18, 2020Updated 5 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- ☆10Mar 6, 2023Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- ☆14Feb 19, 2023Updated 2 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- ☆12Dec 9, 2019Updated 6 years ago
- ☆15Apr 20, 2020Updated 5 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- ☆10Oct 11, 2021Updated 4 years ago
- User-Defined C2 BOF Template☆27Nov 24, 2025Updated 2 months ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- SSE to Stdio MCP Proxy Server☆17Jun 9, 2025Updated 8 months ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago