yolosec / ysoserialView external linksLinks
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
☆34Sep 19, 2016Updated 9 years ago
Alternatives and similar repositories for ysoserial
Users that are interested in ysoserial are comparing it to the libraries listed below
Sorting:
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Oct 21, 2014Updated 11 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 6 years ago
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- Ucki's Recon & Enumeration Pack☆39May 9, 2016Updated 9 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- A custom web vulnerability scanner☆28Nov 17, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Apr 25, 2019Updated 6 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- ☆108Feb 4, 2022Updated 4 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- 🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻☆153Feb 25, 2019Updated 6 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- Automatically extracts API Keys from APK files☆13Feb 1, 2022Updated 4 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- Result files from various fuzzing runs☆16Oct 18, 2021Updated 4 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆297Jun 10, 2019Updated 6 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- ☆13Apr 1, 2017Updated 8 years ago
- NSA headline generator☆32Feb 11, 2014Updated 12 years ago
- Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )☆32Nov 3, 2019Updated 6 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- PoC for leaking text nodes via CSS injection☆35Aug 20, 2018Updated 7 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆71Jan 21, 2019Updated 7 years ago