pimps / ysoserial-modifiedLinks
That repository contains my updates to the well know java deserialization exploitation tool ysoserial.
☆183Updated 3 years ago
Alternatives and similar repositories for ysoserial-modified
Users that are interested in ysoserial-modified are comparing it to the libraries listed below
Sorting:
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆361Updated 3 years ago
- mRemoteNG Config File Decrypt☆90Updated 3 years ago
- A super small jsp webshell with file upload capabilities.☆310Updated 4 years ago
- JMX enumeration and attacking tool.☆474Updated 4 months ago
- Exploit for CVE-2021-3129☆68Updated 4 years ago
- iis6 exploit 2017 CVE-2017-7269☆91Updated 2 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆273Updated 9 months ago
- jolokia-exploitation-toolkit☆299Updated 10 months ago
- SNMP data gather scripts☆84Updated last year
- ☆282Updated 4 years ago
- Changes for Visual Studio 2013☆119Updated 10 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆177Updated 5 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆223Updated 5 years ago
- Shell Simulation over Net-SNMP with extend functionality☆98Updated 4 years ago
- CVE-2019-1388 UAC提权 (nt authority\system)☆191Updated 5 years ago
- ☆205Updated 4 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94Updated 4 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆141Updated 6 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Updated 5 years ago
- ☆215Updated 2 years ago
- Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)☆178Updated 4 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Collection of username lists for enumerating kerberos domain users☆103Updated 7 years ago
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆401Updated 5 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆443Updated 3 years ago
- Juicy Potato for x86 Windows☆129Updated 6 years ago
- project-blacklist3r☆593Updated last month
- IOXIDResolver.py from AirBus Security☆262Updated 2 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆109Updated last year