A small webserver vulnerable to insecure deserialization
☆21Nov 30, 2017Updated 8 years ago
Alternatives and similar repositories for insecure-deserialisation-net-poc
Users that are interested in insecure-deserialisation-net-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WStalker: an easy proxy☆25May 5, 2020Updated 5 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- PHP Emulator☆13Dec 18, 2016Updated 9 years ago
- Cisco CallManager User Enumeration☆16Aug 16, 2022Updated 3 years ago
- A vulnerable Play application for attackers.☆18Apr 7, 2026Updated last week
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- whois.cynthia.re V2☆13May 23, 2021Updated 4 years ago
- Demo Application and Exploit☆35Mar 13, 2017Updated 9 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- a vulnerable web for education of hacking☆11Feb 7, 2021Updated 5 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Terraform module for AWS WAF implementation.☆15May 17, 2022Updated 3 years ago
- Burp Suite extension to perform Kerberos authentication☆106Jun 28, 2024Updated last year
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Mar 6, 2018Updated 8 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- ☆11Apr 18, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆10Jun 1, 2017Updated 8 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Mar 26, 2015Updated 11 years ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- Splunk Web Shell☆51Mar 25, 2015Updated 11 years ago