pimps / ysoserial-modifiedLinks
That repository contains my updates to the well know java deserialization exploitation tool ysoserial.
☆184Updated 3 years ago
Alternatives and similar repositories for ysoserial-modified
Users that are interested in ysoserial-modified are comparing it to the libraries listed below
Sorting:
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆367Updated 3 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆279Updated last year
- A super small jsp webshell with file upload capabilities.☆316Updated 4 years ago
- Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)☆178Updated 5 years ago
- mRemoteNG Config File Decrypt☆92Updated 3 years ago
- jolokia-exploitation-toolkit☆310Updated last year
- JMX enumeration and attacking tool.☆490Updated 7 months ago
- SNMP data gather scripts☆84Updated last year
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆180Updated 5 years ago
- ☆284Updated 4 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆224Updated 5 years ago
- ☆205Updated 4 years ago
- ☆215Updated 3 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Updated 4 years ago
- CVE-2019-1388 UAC提权 (nt authority\system)☆192Updated 6 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- project-blacklist3r☆630Updated 4 months ago
- Exploit for CVE-2021-3129☆68Updated 4 years ago
- NodeJS Red-Team Cheat Sheet☆225Updated 6 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Updated 6 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆446Updated 3 years ago
- Office 365 and Exchange Enumeration☆199Updated 6 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆143Updated 6 years ago
- iis6 exploit 2017 CVE-2017-7269☆92Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 5 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94Updated 4 years ago
- Collection of username lists for enumerating kerberos domain users☆106Updated 8 years ago
- ☆129Updated 7 years ago
- Exploit for Drupal 7 <= 7.57 CVE-2018-7600☆139Updated 7 years ago
- ☆14Updated 5 years ago