victims / maven-security-versionsView external linksLinks
Identify vulnerable libraries in Maven dependencies
☆46Dec 14, 2022Updated 3 years ago
Alternatives and similar repositories for maven-security-versions
Users that are interested in maven-security-versions are comparing it to the libraries listed below
Sorting:
- ☆16Aug 2, 2018Updated 7 years ago
- some java code i met or i used☆29May 7, 2019Updated 6 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- A POC for the Java agent of Elastic APM☆12Mar 1, 2018Updated 7 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Basic raw packet sniffer in Python - Cybrary☆12Nov 21, 2017Updated 8 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- pentest floating repo (based off git submodules), and some useful scripts i wrote☆35Aug 24, 2022Updated 3 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- 三方依赖库扫描系统☆91Jun 10, 2021Updated 4 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- PoC for wget v1.19.1☆52Feb 2, 2018Updated 8 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆386Apr 16, 2022Updated 3 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- Stacktrace Clustering Library☆16May 20, 2012Updated 13 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- ☆45Dec 9, 2022Updated 3 years ago
- Some codes for bypassing Oracle WebLogic CVE-2018-2628 patch☆114May 21, 2018Updated 7 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- CVE-2018-3252-PoC☆74Dec 7, 2018Updated 7 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆191May 17, 2016Updated 9 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Aug 5, 2013Updated 12 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Dec 2, 2016Updated 9 years ago
- XXXX☆32Oct 29, 2017Updated 8 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.☆20Apr 24, 2019Updated 6 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- lcx in python edition☆28Oct 27, 2017Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 6 years ago
- A quick tool for hiding a new process running shellcode.☆57Jun 10, 2020Updated 5 years ago
- A DNS tunnel utilizing the Burp Collaborator☆104Oct 8, 2019Updated 6 years ago