ring04h / Java-Deserialization-ScannerLinks
All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities
☆11Updated 8 years ago
Alternatives and similar repositories for Java-Deserialization-Scanner
Users that are interested in Java-Deserialization-Scanner are comparing it to the libraries listed below
Sorting:
- Burp Suite Collaborator HTTP API☆45Updated 7 years ago
- Burpsuite HTTP 插件,主要用于内网测试,可定制Content-Type和Response Content☆24Updated 7 years ago
- CVE-2017-10271 POC☆29Updated 7 years ago
- CVE-2018-2628 & CVE-2018-2893☆78Updated 7 years ago
- phpstudy批量检测mysql弱口令☆20Updated 9 years ago
- The Demo for CVE-2017-11427☆12Updated 7 years ago
- ☆41Updated 6 years ago
- Discuz!利用SSRF+缓存应用代码执行漏洞环境搭建及验证脚本☆17Updated 9 years ago
- 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical da…☆26Updated 8 years ago
- 多线程批量扫描ssrf漏洞☆28Updated 8 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆71Updated 5 years ago
- CVE-2017-0199☆16Updated 8 years ago
- ☆17Updated 6 years ago
- ☆16Updated 7 years ago
- 自动化被动扫描系统分为数据源、数据处理、漏洞验证等三个子系统,本系统属于漏洞验证部分,根据提供的数据进行分布式安全验证,确定是否包含相关严重漏洞。☆49Updated 7 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Updated 7 years ago
- CVE-2018-3252-PoC☆74Updated 6 years ago
- nmap web gui☆42Updated 7 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 6 years ago
- Phantom eye——A passive business logic vulnerability auditing tool☆55Updated 6 years ago
- vulhub下载器,可则需下载对应环境☆23Updated 7 years ago
- Sniffer vulnerabilities in http request (chrome extension)☆20Updated 8 years ago
- jenkins payload☆17Updated 8 years ago
- 常用的一些Exploit,经常会更新,也欢迎各位提交新的exp给我。☆26Updated 7 years ago
- Weblogic-CVE-2018-3191远程代码命令执行漏洞☆67Updated 6 years ago
- Explib: Collections of poc and exp.☆21Updated 7 years ago
- CVE-2018-3191 反弹shell☆63Updated 6 years ago
- CVE-2018-3191 反弹shell☆16Updated 6 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Updated 9 years ago
- The Security Practices of Party A Phishing☆20Updated 5 years ago