JackOfMostTrades / gadgetinspector
A byte code analyzer for finding deserialization gadget chains in Java applications
☆1,013Updated 3 years ago
Alternatives and similar repositories for gadgetinspector:
Users that are interested in gadgetinspector are comparing it to the libraries listed below
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆778Updated 3 years ago
- A tool to dump Java serialization streams in a more human readable form.☆1,005Updated 7 months ago
- Java RMI enumeration and attack tool.☆724Updated 7 years ago
- A helpful Java Deserialization exploit framework.☆1,197Updated 7 months ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆593Updated 3 years ago
- Java Message Exploitation Tool☆495Updated 2 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆475Updated 4 years ago
- A CAT called tabby ( Code Analysis Tool )☆1,340Updated last week
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆497Updated 2 years ago
- A tiny project for generating SnakeYAML deserialization payloads☆577Updated 5 years ago
- ☆467Updated last year
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆351Updated 2 years ago
- java source code static code analysis and danger function identify prog☆532Updated 5 years ago
- A static byte code analyzer for Java deserialization gadget research☆241Updated 7 years ago
- J2EEScan is a plugin for Burp Suite Proxy. The goal of this plugin is to improve the test coverage during web application penetration tes…☆648Updated last year
- Redis(<=5.0.5) RCE☆1,021Updated last year
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆513Updated 4 years ago
- Tomcat-Ajp协议文件读取漏洞☆772Updated 4 years ago
- Java RMI Vulnerability Scanner☆851Updated 6 months ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆574Updated 3 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆425Updated 2 years ago
- Web Security Technology & Vulnerability Analysis Whitepapers☆541Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆591Updated 3 years ago
- MySQL fake server for read files of connected clients☆592Updated 7 years ago
- Automated HTTP Request Repeating With Burp Suite☆861Updated 3 years ago
- Proofs-of-concept☆783Updated 4 months ago
- The great impacket example scripts compiled for Windows☆934Updated 5 years ago
- A .DS_Store file disclosure exploit. It parses .DS_Store file and downloads files recursively.☆1,582Updated last year
- Redis 4.x/5.x RCE☆946Updated 3 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,057Updated last year