pimps / ysoserial-modifiedLinks
That repository contains my updates to the well know java deserialization exploitation tool ysoserial.
☆183Updated 3 years ago
Alternatives and similar repositories for ysoserial-modified
Users that are interested in ysoserial-modified are comparing it to the libraries listed below
Sorting:
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆362Updated 3 years ago
- A super small jsp webshell with file upload capabilities.☆313Updated 4 years ago
- mRemoteNG Config File Decrypt☆90Updated 3 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆178Updated 5 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆274Updated 10 months ago
- JMX enumeration and attacking tool.☆479Updated 5 months ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆141Updated 6 years ago
- jolokia-exploitation-toolkit☆299Updated 11 months ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94Updated 4 years ago
- ☆282Updated 4 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Updated 4 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Updated 5 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆223Updated 5 years ago
- Exploit for CVE-2021-3129☆68Updated 4 years ago
- Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)☆178Updated 4 years ago
- Collection of username lists for enumerating kerberos domain users☆103Updated 7 years ago
- ☆215Updated 2 years ago
- ☆205Updated 4 years ago
- IOXIDResolver.py from AirBus Security☆263Updated 2 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆110Updated last year
- CVE-2019-1388 UAC提权 (nt authority\system)☆191Updated 6 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆443Updated 3 years ago
- MOGWAI LABS JMX exploitation toolkit☆205Updated 2 years ago
- Shell Simulation over Net-SNMP with extend functionality☆98Updated 4 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 4 years ago
- SNMP data gather scripts☆84Updated last year
- Exploit for Drupal 7 <= 7.57 CVE-2018-7600☆136Updated 7 years ago
- iis6 exploit 2017 CVE-2017-7269☆91Updated 2 years ago
- Office 365 and Exchange Enumeration☆199Updated 6 years ago