0linlin0 / CyberBox
Java Exp FrameWork
☆105Updated 3 years ago
Related projects: ⓘ
- ☆88Updated this week
- 使用java agent反序列化注入内存shell☆67Updated 3 years ago
- bypass JEP290 RaspHook code☆63Updated 3 years ago
- ☆137Updated this week
- ☆74Updated this week
- ☆108Updated this week
- ☆78Updated this week
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆100Updated 4 years ago
- ☆48Updated this week
- Redis RCE 的几种方法☆90Updated 3 months ago
- openam-CVE-2021-35464 tomcat 执行命令回显☆87Updated last year
- WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)☆58Updated 4 years ago
- 🐸fingerprint detect framework 批量深度指纹识别框架☆119Updated last year
- fastjson 1.2.68 版本 autotype bypass☆140Updated 2 years ago
- 一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-442…☆121Updated 2 years ago
- Spring Cloud SnakeYAML 反序列化一键注入cmdshell和reGeorg☆128Updated 3 years ago
- xxl-job RESTful API RCE☆71Updated 3 years ago
- Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。☆90Updated 2 years ago
- 记录各语言、框架中危险的sink,个人代码审计、漏洞研究使用。☆114Updated 2 years ago
- ☆58Updated 4 years ago
- 用于WebLogic poc及exp测试的基础脚本,后续将集成各版本poc库☆94Updated 3 years ago
- ☆145Updated 3 years ago
- ☆210Updated this week
- RMI 反序列化环境 一步步☆211Updated 4 years ago
- SMTP Netcat , test SMTP protocol☆105Updated 2 years ago
- 一些结合第三方组件的Fastjson POC,在1.2.48以后版本中陆续被添加至黑名单。☆53Updated 4 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆255Updated last year
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆68Updated 4 years ago
- 中国蚁剑JSP一句话Payload☆117Updated 3 years ago