hackedteam/vector-applet

View on GitHub
Branch: master(View all)
NameLines of codeMaintainabilityTest coverage
weaponized/server/applet/version
direct/java-map-update.xml
twostage/build/classes-exploit/x/puc
twostage/server/applet/version
twostage/server/applet/applet.html
weaponized/server/applet/applet.html
weaponized/payloads/putty
weaponized/lib/asm-all-3.3.1.jar
direct/java-policy.sec
weaponized/server/applet-x.zip
twostage/html/applet.demo.html
twostage/payloads/putty
weaponized/applets.pro
direct/makeapplet.vbs
twostage/html/applet.html
.gitignore
weaponized/src-exploit/x/input.xml
weaponized/payloads/mac
weaponized/payloads/nowin
weaponized/payloads/rcs
weaponized/server/applet/zip.exe
weaponized/server/applet-w.zip
weaponized/Readme.txt
twostage/src-exploit/x/puc
direct/jre-windows-i586-iftw-rv.exe
twostage/build/classes-exploit/x/classes.ser
twostage/build.xml
weaponized/build.xml
twostage/src-exploit/x/bytes.ser
twostage/out.map
weaponized/html/jarWeaponPayload.html
weaponized/payloads/win
direct/makeapplet.sh
direct/java-1.6.0_30.xml
twostage/build/classes-exploit/x/pr
twostage/build/jar/x.jar
twostage/lib/proguard.jar
weaponized/payloads/nomac
twostage/src-exploit/x/classes.ser
twostage/lib/asm-all-3.3.1.jar
weaponized/lib/proguard.jar
direct/JavaUpgrade.jnlp
twostage/applets.pro
twostage/src-exploit/x/pr
twostage/server/applet/zip.exe
twostage/Readme.txt
direct/makeupgrade.vbs
weaponized/src-exploit/x/EP.java8
A
0 mins
twostage/src-exploit/x/EP.java8
A
0 mins
twostage/src-exploit/x/MyRunnable.java9
A
0 mins