A collection of curated Java Deserialization Exploits
☆591May 16, 2021Updated 4 years ago
Alternatives and similar repositories for java-deserialization-exploits
Users that are interested in java-deserialization-exploits are comparing it to the libraries listed below
Sorting:
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,516Jan 21, 2020Updated 6 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,172May 26, 2023Updated 2 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆801Nov 7, 2021Updated 4 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 3 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆522Mar 11, 2022Updated 4 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 7 years ago
- ☆502Mar 10, 2016Updated 10 years ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆607May 17, 2019Updated 6 years ago
- Vulnerability Labs for security analysis☆1,170Mar 10, 2021Updated 5 years ago
- fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java☆403Dec 16, 2022Updated 3 years ago
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆298Jun 10, 2019Updated 6 years ago
- Java Message Exploitation Tool☆510Jul 6, 2022Updated 3 years ago
- Apache Solr Injection Research☆580Jan 28, 2020Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- CVE-2019-2725 命令回显☆436May 8, 2023Updated 2 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- java unserialize vul for weblogic exploit☆176Jul 20, 2018Updated 7 years ago
- MS17-010☆2,233Jun 20, 2023Updated 2 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆518Jul 29, 2020Updated 5 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- Will to be a niubility scan-framework☆519Jul 1, 2025Updated 8 months ago
- ✍️ A curated list of CVE PoCs.☆3,484Jan 4, 2022Updated 4 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- ☆133Nov 6, 2015Updated 10 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,483Oct 12, 2024Updated last year
- Java deserialization exploitation lab.☆237Mar 1, 2019Updated 7 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- Dynamic file detection tool based on crawler 基于爬虫的动态敏感文件探测工具☆253May 2, 2020Updated 5 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,272Sep 4, 2022Updated 3 years ago
- ☆128Oct 19, 2016Updated 9 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- ActiveScan++ Burp Suite Plugin☆659Dec 16, 2025Updated 3 months ago
- F-Scrack is a single file bruteforcer supports multi-protocol☆310Sep 5, 2017Updated 8 years ago
- Miscellaneous exploit code☆1,569Oct 6, 2023Updated 2 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 8 years ago
- a fast domain brute tool☆414Mar 2, 2018Updated 8 years ago