pimps / gopher-tomcat-deployerLinks
Gopher Tomcat Deployer
☆48Updated 6 years ago
Alternatives and similar repositories for gopher-tomcat-deployer
Users that are interested in gopher-tomcat-deployer are comparing it to the libraries listed below
Sorting:
- Exploitation toolkit for RichFaces☆104Updated last year
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Updated 4 years ago
- Example Vulnerable .NET HTTP Remoting☆86Updated 6 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆48Updated 4 years ago
- Utility for creating ZipSlip archives☆74Updated 2 years ago
- Authenticated SSRF in Grafana☆82Updated last year
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Updated 4 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆76Updated 7 years ago
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆36Updated 3 years ago
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆107Updated 5 years ago
- tetctf2020_amf_writeups☆23Updated 4 years ago
- Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit☆89Updated last year
- Generating payloads to reverse shell in different contexts of java.☆49Updated 3 years ago
- ☆65Updated 4 years ago
- Citrix ADC Vulns☆87Updated 5 years ago
- Exploits developed by Mikael Kall☆47Updated 2 years ago
- ☆117Updated 5 years ago
- Exploitation code for CVE-2021-40539☆47Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- A Burp extension to show the Collaborator client in a tab☆24Updated 2 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆30Updated 3 years ago
- Hacking Artifactory with server side template injection☆51Updated 5 years ago
- Public Disclosures☆91Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 4 years ago
- Catalogue de payloads destinés au téléversement de fichiers. Il s'agit d'un ensemble de plusieurs fichiers contenant du code malveillant …☆41Updated last year
- ☆17Updated 2 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- ☆51Updated 3 years ago
- Compiled dataset of Java deserialization CVEs☆62Updated 4 years ago
- A malicious LDAP server for JNDI injection attacks☆75Updated 9 months ago