☆17Dec 14, 2022Updated 3 years ago
Alternatives and similar repositories for Jolokia-RCE
Users that are interested in Jolokia-RCE are comparing it to the libraries listed below
Sorting:
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆12Feb 1, 2022Updated 4 years ago
- ☆18Apr 7, 2022Updated 3 years ago
- Dnslog Interactsh的Py版接口查询☆13Dec 10, 2021Updated 4 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- ☆73Jun 26, 2022Updated 3 years ago
- CVE-2021-22192☆13Apr 28, 2021Updated 4 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- CVE-2021-40865☆14Nov 26, 2021Updated 4 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Jan 22, 2022Updated 4 years ago
- The king of shell -Javaweb Memory Shell☆26Mar 29, 2023Updated 2 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆80Jul 29, 2022Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Mar 2, 2022Updated 4 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- ☆27Feb 7, 2023Updated 3 years ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆75Mar 22, 2024Updated 2 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60May 16, 2021Updated 4 years ago
- 当找不到任何weblogic路径时打内存马的代码,原理为拦截404请求最开始的代码,通过java agent修改为webshell的逻辑。☆15Nov 22, 2021Updated 4 years ago
- POC for leaking java version through file and ftp protocols☆24Nov 1, 2020Updated 5 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Chrome extension that finds DOM based XSS vulnerabilities☆76Jun 3, 2025Updated 9 months ago
- Client-Side Prototype Pollution Tools☆87Sep 21, 2021Updated 4 years ago
- 😛 Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project supp…☆18Apr 18, 2023Updated 2 years ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- Chrome extension to detect possible xsleaks☆12May 4, 2019Updated 6 years ago
- Simple tool to test for SSRF/OOB HTTP Read within the Path of a request☆30Aug 2, 2019Updated 6 years ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Burp Suite extension to easily export sub domains☆12Dec 2, 2019Updated 6 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Dec 11, 2020Updated 5 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- ☆15May 6, 2023Updated 2 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year