Some payloads of JNDI Injection in JDK 1.8.0_191+
☆10Mar 24, 2020Updated 6 years ago
Alternatives and similar repositories for JNDI-Injection-Bypass
Users that are interested in JNDI-Injection-Bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Jsp Decoder Source Code☆16Mar 23, 2021Updated 5 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- 短信接码工具☆15Jun 6, 2020Updated 5 years ago
- grafana 8.4.3 (b7d2911ca)☆29Aug 2, 2022Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- ☆21Jan 8, 2019Updated 7 years ago
- ☆14Feb 12, 2026Updated last month
- Open Redirect scanner - (out of date)☆28Nov 27, 2022Updated 3 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Apr 1, 2022Updated 3 years ago
- Place for random PoCs☆18May 21, 2020Updated 5 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Aug 4, 2023Updated 2 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- cs4.0 cs 4.1 beacon加解密☆25Mar 29, 2021Updated 4 years ago
- Fuzzer for Amplification Vulnerabilities (USENIX '22, Krupp et al)☆16Aug 27, 2022Updated 3 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Capture Drift Funding Rates On-Chain -- if the funding rate is negative (longs get paid) then the vault opens a new long and captures the…☆10Apr 15, 2022Updated 3 years ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated 2 months ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/burp-extensions☆10Feb 18, 2020Updated 6 years ago
- 微信公众号文章爬虫☆28Apr 5, 2020Updated 5 years ago
- [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains.…☆177Oct 21, 2022Updated 3 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Extract relative urls from a heap snapshot☆87May 30, 2021Updated 4 years ago
- A collection of all the CTF challenges I have made.☆11Aug 24, 2022Updated 3 years ago
- ☆13Dec 21, 2020Updated 5 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆27Feb 10, 2026Updated last month
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo