AfterSnows / ApricusFindEvilLinks
检测查杀java内存马
☆79Updated last year
Alternatives and similar repositories for ApricusFindEvil
Users that are interested in ApricusFindEvil are comparing it to the libraries listed below
Sorting:
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆80Updated last year
- 自己积累的一些Java反序列化利用链☆89Updated 2 years ago
- 基于ysoserial扩展命令执行结果回显,生成冰蝎内存马☆89Updated last year
- ☆117Updated last year
- Java 内存马生成插件☆52Updated last year
- 如何将Java反序列化Payload极致缩小☆53Updated 3 years ago
- 一款让你不只在dubbo-sample、vulhub或者其他测试环境里检测和利用成功的Apache Dubbo 漏洞检测工具。☆168Updated last year
- 如果反序列化过程中使用resolveClass拉黑了TemplatesImpl如何绕过☆51Updated last year
- 使用 agent 实现反序列化 utf8 overlong☆77Updated last year
- 《FanZhi-攻击与反制的艺术》☆65Updated last year
- ☆69Updated 4 years ago
- 本工具的定位是快速生成Java安全相关的Payload,如内存马、反序列化链、JNDI url、Fastjson等,动态生成相关Payload,并附带相应的文档。☆93Updated 3 months ago
- 这是一个用Go编写的红队内网环境中一个能快速开启HTTP文件浏览服务的小工具,能够执行shell命令,可以执行webshell☆78Updated 2 years ago
- MemShell List☆81Updated last year
- java实现反序列化建立socket连接☆60Updated 5 months ago
- springboot跨线程注入内存马☆119Updated 3 years ago
- Java命令行文件监控小工具(代码审计)☆102Updated 3 years ago
- ☆56Updated last year
- fastjson 80 远程代码执行漏洞复现☆194Updated 2 years ago
- A Go library for generating Java deserialization payloads.☆155Updated 8 months ago
- 用Go+Fyne开发的,展示JAVA序列化流以及集成一键插入脏数据,UTF过长编码绕WAF(Utf OverLoad Encoding),修改类SerializeVersionUID功能的图形化工具。☆109Updated 4 months ago
- 基于污点分析和模拟栈帧技术的JSP Webshell检测☆45Updated 5 months ago
- A Java Route Collection Tool☆97Updated 10 months ago
- 在原有yso基础上实现依赖分离,内存马注入等功能。A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆68Updated 3 years ago
- CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!☆93Updated 6 months ago
- ☆14Updated 2 years ago
- Attack cobalt strike server’s FCS by DoW☆72Updated last year
- JDBC Attack Tricks☆142Updated last year
- Java漏洞调试分析集合☆89Updated last year
- A malicious LDAP server for JNDI injection attacks☆52Updated 2 years ago