vah13 / SAP_vulnerabilities
DoS PoC's for SAP products
☆50Updated 7 years ago
Alternatives and similar repositories for SAP_vulnerabilities:
Users that are interested in SAP_vulnerabilities are comparing it to the libraries listed below
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Study about HQL injection exploitation.☆51Updated 8 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 4 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆52Updated 11 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- Extension adds a new tab in Burp Suite called Extractor☆43Updated 5 years ago
- Metasploit msfvenom Bash Completions Generator☆42Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Utilities for creating Burp Suite Extensions.☆21Updated 4 months ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Advance URL Fuzzing + Whois Domain running on python☆17Updated 2 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- Another plugin for CRLF vulnerability detection☆26Updated 8 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆34Updated 8 years ago
- .NET Deserialization Passive Scanner☆45Updated 7 years ago