twelvesec / JDSer-DCompLinks
A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.
☆24Updated 6 years ago
Alternatives and similar repositories for JDSer-DComp
Users that are interested in JDSer-DComp are comparing it to the libraries listed below
Sorting:
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- ☆19Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Exploits developped by Outflank B.V. team members☆21Updated 8 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 6 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 9 years ago
- ☆21Updated 5 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Updated 2 months ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 7 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆48Updated 2 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- Accompanying material needed for the workshop☆11Updated 2 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆19Updated 5 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆32Updated 4 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 11 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- eternalrelayx☆36Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Capture all RabbitMQ messages being sent through a broker.☆32Updated 4 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆55Updated 5 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- A Burp Suite extension for headless, unattended scanning.☆37Updated 5 years ago