Remote Java classpath enumeration via deserialization
☆22May 23, 2023Updated 2 years ago
Alternatives and similar repositories for EnumJavaLibs
Users that are interested in EnumJavaLibs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- ☆15Oct 25, 2021Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Exploitation toolkit for RichFaces☆106Nov 3, 2023Updated 2 years ago
- reversing mtk-su☆17Mar 4, 2020Updated 6 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 9 years ago
- Apache Solr DataImport Handler RCE☆91Aug 12, 2019Updated 6 years ago
- JVM runtime class loading protection agent.(JVM类加载保护agent)☆48Mar 25, 2021Updated 5 years ago
- ☆14Mar 8, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- Atlassian Questions Hardcoded Password (CVE-2022-26138)☆31Jul 26, 2022Updated 3 years ago
- A centralized list of the various Potato Windows exploits.☆22Mar 31, 2026Updated last week
- ☆54Aug 10, 2018Updated 7 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Native Java serialization filter blacklist for common gadgets☆20Sep 12, 2019Updated 6 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 5 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- woodpecker-framework sdk☆10May 19, 2021Updated 4 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 9 years ago
- The Alternative Fileless File System☆57Apr 4, 2019Updated 7 years ago
- 个人用于在自动化挖掘gadget时,方便查找gadget chains中class所在jar包,以助于便捷审计测试gadget有效性的那么一个小工具。☆60Mar 25, 2020Updated 6 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 10 months ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- ☆13Nov 3, 2023Updated 2 years ago
- ☆31Jun 7, 2021Updated 4 years ago
- ☆76May 23, 2024Updated last year
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆521Mar 11, 2022Updated 4 years ago