siberas / sjet
siberas JMX exploitation toolkit
☆129Updated last year
Alternatives and similar repositories for sjet:
Users that are interested in sjet are comparing it to the libraries listed below
- Java serialization brute force attack tool.☆123Updated 7 years ago
- An interactive OOB XXE data exfiltration tool☆91Updated 7 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆103Updated 6 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆122Updated 7 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆132Updated 3 years ago
- ☆42Updated 4 years ago
- DupeKeyInjector☆135Updated 2 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆126Updated 2 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆98Updated 5 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆52Updated 11 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Central Repo for Burp extensions☆150Updated 3 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆136Updated 4 years ago
- Burp extension☆57Updated 6 years ago
- A DNS tunnel utilizing the Burp Collaborator☆99Updated 5 years ago
- Burp Suite extension to passively scan for applications revealing server error messages☆66Updated last year
- poison and relay NTLM credentials☆174Updated 6 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- Burp Suite extension for JAX-RS☆65Updated 7 years ago
- ☆70Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆91Updated 3 years ago
- YSOSERIAL Integration with burp suite☆163Updated 2 years ago
- Burp Suite Attack Selector Plugin☆61Updated 7 years ago
- Atlassian JIRA Template injection vulnerability RCE☆93Updated 5 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆34Updated 8 years ago
- Some scripts and exploits☆143Updated 6 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆107Updated 6 years ago