peterjson31337 / tetctf2021Links
tetctf2020_amf_writeups
☆23Updated 4 years ago
Alternatives and similar repositories for tetctf2021
Users that are interested in tetctf2021 are comparing it to the libraries listed below
Sorting:
- Gopher Tomcat Deployer☆48Updated 6 years ago
- Utility for creating ZipSlip archives☆72Updated 2 years ago
- S2-061 CVE-2020-17530☆29Updated 4 years ago
- Several XStream gadgets ported from ysoserial☆33Updated 3 years ago
- Template Injection in Email Templates leads to code execution on Jira Service Management Server☆47Updated 3 years ago
- ☆26Updated last year
- Compiled dataset of Java deserialization CVEs☆61Updated 4 years ago
- Exploitation code for CVE-2021-40539☆46Updated 3 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Updated 5 years ago
- Authenticated SSRF in Grafana☆82Updated 11 months ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Apache Flink 目录遍历漏洞批量检测 (CVE-2020-17519)☆48Updated 4 years ago
- Intentionally Vulnerable to Spring4Shell☆52Updated 3 years ago
- A Burp extension to show the Collaborator client in a tab☆24Updated 2 years ago
- ☆15Updated 3 years ago
- ☆73Updated 2 years ago
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆106Updated 5 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Updated 4 years ago
- ☆34Updated 3 years ago
- ☆22Updated 2 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆40Updated 3 years ago
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Updated 4 years ago
- ☆17Updated 2 years ago
- A Proof of concept for CVE-2021-27850 affecting Apache Tapestry and leading to unauthencticated remote code execution.☆5Updated 2 years ago
- ☆27Updated 3 years ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Updated 3 years ago
- GreHack 2021 CodeQL for Java workshop☆75Updated 3 years ago
- ☆54Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 3 years ago
- ☆18Updated 2 months ago