A small webserver vulnerable to insecure deserialization
☆21Nov 30, 2017Updated 8 years ago
Alternatives and similar repositories for insecure-deserialisation-net-poc
Users that are interested in insecure-deserialisation-net-poc are comparing it to the libraries listed below
Sorting:
- WStalker: an easy proxy☆25May 5, 2020Updated 5 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- Experimental Windows .text section Patch Detector☆22Jan 26, 2015Updated 11 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.☆46Aug 20, 2025Updated 6 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Demo Application and Exploit☆35Mar 13, 2017Updated 8 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Oct 9, 2021Updated 4 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- ☆10Mar 6, 2023Updated 3 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- password store☆17Apr 21, 2014Updated 11 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- ☆10Oct 11, 2021Updated 4 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- CDB-PIg is a plugin for cdb, but not windbg.☆11Nov 29, 2018Updated 7 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago