attackRmi

RMI Exploit Tool

A tool designed to exploit vulnerabilities in the Java RMI system using various techniques such as deserialization and socket-based attacks.

attackRmi

GitHub

250 stars
4 watching
13 forks
Language: Java
last commit: about 4 years ago

Related projects:

Repository Description Stars
qtc-de/remote-method-guesser A tool used to identify and exploit security vulnerabilities in Java RMI endpoints 828
pimps/jndi-exploit-kit An exploit kit designed to start an HTTP Server, RMI Server and LDAP Server to exploit Java web apps vulnerable to JNDI Injection 903
mssabr01/sixnet-tools A tool that exploits vulnerabilities in Sixnet RTUs to gain root-level access 16
mogwailabs/rmi-deserialization Demonstrating vulnerabilities in Java RMI services 101
nshalabi/attack-tools Utilities for simulating adversary behavior in the context of threat intelligence and security analysis 1,012
649/memcrashed-ddos-exploit A tool designed to send forged UDP packets to vulnerable Memcached servers, exploiting them in a DDoS attack. 1,336
nickstadb/barmie An enumeration and attack tool for insecure RMI services 715
weisong-ucr/mab-malware An open-source reinforcement learning framework to generate adversarial examples for malware classification models. 40
mitre/advmlthreatmatrix A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems 1,050
strepsirrhini-army/chaos-lemur An application that randomly destroys virtual machines in a BOSH-managed environment to test resilience and availability. 62
mgeeky/redwarden A tool to evade detection by security systems and incident responders by manipulating HTTP requests 926
exploitsecurityio/uart-exploiter A tool designed to access and manipulate UART interfaces using an FTDI cable. 5
firebasky/csrouge A tool that exploits vulnerabilities in web servers to execute arbitrary code 9
rfunix/pompem Automates searches for exploits and vulnerabilities across multiple databases 984
bkerler/exploit_me An educational platform showcasing 14 different types of vulnerabilities in ARM/AARCH64 applications through CTF-style exploitation tutorials. 895