ring04h / Java-Deserialization-ScannerLinks
All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities
☆11Updated 9 years ago
Alternatives and similar repositories for Java-Deserialization-Scanner
Users that are interested in Java-Deserialization-Scanner are comparing it to the libraries listed below
Sorting:
- Burpsuite HTTP 插件,主要用于内网测试,可定制Content-Type和Response Content☆24Updated 7 years ago
- Burp Suite Collaborator HTTP API☆45Updated 7 years ago
- ☆41Updated 7 years ago
- The Demo for CVE-2017-11427☆12Updated 7 years ago
- Discuz!利用SSRF+缓存应用代码执行漏洞环境搭建及验证脚本☆16Updated 9 years ago
- Sniffer vulnerabilities in http request (chrome extension)☆20Updated 8 years ago
- 多线程批量扫描ssrf漏洞☆28Updated 8 years ago
- CVE-2017-10271 POC☆29Updated 8 years ago
- spring mvc cve-2014-3625☆32Updated 9 years ago
- CVE-2018-3191 反弹shell☆16Updated 7 years ago
- CVE-2018-3252-PoC☆74Updated 7 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆71Updated 5 years ago
- 总结一些渗透中值得关注的默认端口☆23Updated 9 years ago
- 常用的一些Exploit,经常会更新,也欢迎各位提交新的exp给我。☆26Updated 7 years ago
- vulhub下载器,可则需下载对应环境☆23Updated 7 years ago
- CVE-2018-2628 & CVE-2018-2893☆78Updated 7 years ago
- 一款存储HTTP请求入库的burpsuite插件☆29Updated 7 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 7 years ago
- A burp extender that recalculate signature value automatically after you modified request parameter value.☆60Updated 3 years ago
- ☆16Updated 7 years ago
- The Security Practices of Party A Phishing☆20Updated 6 years ago
- Phantom eye——A passive business logic vulnerability auditing tool☆54Updated 6 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Updated 9 years ago
- 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical da…☆26Updated 9 years ago
- Explib: Collections of poc and exp.☆21Updated 7 years ago
- fuck☆25Updated 9 years ago
- phpstudy批量检测mysql弱口令☆20Updated 10 years ago
- 漏洞测试环境 - 方便写扫描器利用复现☆27Updated 6 years ago
- 自动化被动扫描系统分为数据源、数据处理、漏洞验证等三个子系统,本系统属于漏洞验证部分,根据提供的数据进行分布式安全验证,确定是否包含相关严重漏洞。☆49Updated 8 years ago
- ☆13Updated 7 years ago