SuperSerial-Active

Vulnerability scanner

An active Java deserialization vulnerability identifier and exploiter

GitHub

7 stars
1 watching
3 forks
Language: Java
last commit: over 4 years ago

Related projects:

Repository Description Stars
directdefense/superserial A Burp Suite Extender to identify Java Deserialization vulnerabilities in client requests and server responses. 9
s0md3v/striker An offensive information and vulnerability scanner that identifies potential security issues in web applications 2,234
secdec/attack-surface-detector-burp Identifies web app endpoints and parameters to help detect vulnerabilities 98
jackofmosttrades/gadgetinspector Analyzes Java applications for potential deserialization gadget chains to help identify vulnerabilities and prioritize remediation. 996
bishopfox/gadgetprobe Tools for analyzing and exploiting vulnerabilities in Java deserialization vulnerabilities 585
federicodotta/java-deserialization-scanner A plugin for detecting and exploiting vulnerabilities in Java deserialization 775
nccgroup/freddy A tool to detect and exploit deserialization vulnerabilities in Java and .NET applications. 573
shenril/sitadel A tool for identifying vulnerabilities in web applications using automated attacks and fingerprinting 554
sunweb3sec/defivulnlabs A comprehensive training and testing guide for common smart contract vulnerabilities in DeFi applications 1,587
dan7800/vulnerableandroidapporacle An analysis of an Android app vulnerable to oracle-based attacks 42
delvelabs/vane2 Identifies vulnerabilities in WordPress websites by scanning plugins and themes 28
designsecurity/progpilot An application security testing tool for identifying vulnerabilities in PHP code 330
them4hd1/jcs Automated tool to identify vulnerabilities in Joomla components and generate reports 60
eddiezab/aggressor-scripts A collection of scripts and tools for testing and exploiting network and system vulnerabilities. 1
sectooladdict/wavsep An open-source tool for evaluating web application vulnerabilities by analyzing the separation of concerns in web applications. 228