pandujar / elasticpwnLinks
Scripts for ElasticSearch vulns
☆13Updated 10 years ago
Alternatives and similar repositories for elasticpwn
Users that are interested in elasticpwn are comparing it to the libraries listed below
Sorting:
- Java Untrusted Deserialization Exploits Tools☆67Updated 10 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Updated 9 years ago
- ☆35Updated 9 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Updated 7 years ago
- scripts used in my pentest work.☆44Updated 9 years ago
- DoS PoC's for SAP products☆51Updated 7 years ago
- Axis2 RPC Shell☆15Updated 10 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 7 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Updated 7 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Updated 8 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Updated 8 years ago
- Automates credential skimming from service accounts in Windows Registry☆77Updated 5 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 8 years ago
- Small modification version of p0wnedShell☆40Updated 9 years ago
- ☆20Updated last year
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- ☆22Updated 9 years ago
- A weaponized version of CVE-2018-9206☆62Updated 7 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 8 years ago
- PHP root (suid) reverse shell☆74Updated 8 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Updated 8 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Updated 8 years ago
- ☆46Updated 9 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 10 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 7 years ago
- ☆63Updated 7 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- Memcache hacking tool.☆47Updated 8 years ago