hackedteam/vector-applet

View on GitHub
Branch: master(View all)
NameLines of codeMaintainabilityTest coverage
direct/java-policy.sec
twostage/build/classes-exploit/x/puc
twostage/lib/proguard.jar
weaponized/lib/asm-all-3.3.1.jar
twostage/html/applet.html
twostage/server/applet/zip.exe
weaponized/src-exploit/x/input.xml
weaponized/payloads/rcs
weaponized/Readme.txt
twostage/applets.pro
twostage/src-exploit/x/pr
twostage/server/applet/applet.html
.gitignore
direct/java-1.6.0_30.xml
twostage/payloads/putty
twostage/build/classes-exploit/x/pr
weaponized/server/applet/applet.html
weaponized/payloads/nomac
weaponized/html/jarWeaponPayload.html
weaponized/server/applet/zip.exe
weaponized/payloads/putty
twostage/build/classes-exploit/x/classes.ser
direct/java-map-update.xml
weaponized/server/applet-w.zip
direct/makeapplet.vbs
twostage/html/applet.demo.html
twostage/build.xml
weaponized/applets.pro
weaponized/server/applet-x.zip
direct/makeapplet.sh
twostage/build/jar/x.jar
twostage/out.map
twostage/src-exploit/x/puc
twostage/src-exploit/x/bytes.ser
twostage/lib/asm-all-3.3.1.jar
weaponized/payloads/mac
weaponized/payloads/win
weaponized/lib/proguard.jar
direct/JavaUpgrade.jnlp
twostage/Readme.txt
weaponized/server/applet/version
weaponized/payloads/nowin
weaponized/build.xml
direct/makeupgrade.vbs
direct/jre-windows-i586-iftw-rv.exe
twostage/src-exploit/x/classes.ser
twostage/server/applet/version
twostage/src-exploit/x/EP.java8
A
0 mins
weaponized/src-exploit/x/EP.java8
A
0 mins
twostage/src-exploit/x/MyRunnable.java9
A
0 mins