redtimmy / EnumJavaLibsLinks
Remote Java classpath enumeration via deserialization
☆22Updated 2 years ago
Alternatives and similar repositories for EnumJavaLibs
Users that are interested in EnumJavaLibs are comparing it to the libraries listed below
Sorting:
- ☆25Updated 4 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- ☆30Updated 6 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- Privilege escalation using dmidecode☆20Updated 6 years ago
- Some of my public exploits☆51Updated 4 years ago
- ☆44Updated 5 years ago
- ☆19Updated 4 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆32Updated 4 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 5 years ago
- PoC for CVE-2020-1015☆40Updated 5 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- eternalrelayx☆37Updated 6 years ago
- public exploits☆35Updated 2 years ago
- ☆38Updated 5 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- ☆11Updated 2 years ago
- PoC CVE-2020-6308☆36Updated 4 years ago
- Security Advisories☆11Updated 5 years ago
- .NET Deserialization Passive Scanner☆45Updated 7 years ago
- ☆1Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 6 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago