- France - Paris
- https://ddracepro.net
Stars
Ghidra is a software reverse engineering (SRE) framework
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
OpenGrok is a fast and usable source code search and cross reference engine, written in Java
A cli tool that helps signing and zip aligning single or multiple Android application packages (APKs) with either debug or provided release certificates. It supports v1, v2 and v3 Android signing s…
Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android
latest version of scanners for IIS short filename (8.3) disclosure vulnerability
Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).
A byte code analyzer for finding deserialization gadget chains in Java applications
A malicious LDAP server for JNDI injection attacks
JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps v…
80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background services by starting RMI server,LDAP server and HTTP server.
A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques
Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
Analyses your Java applications for open-source dependencies with known vulnerabilities, using both static analysis and testing to determine code context and usage for greater accuracy. https://ecl…
RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities
iOS9+ iCloud backup retrieval proof of concept