KTH-LangSec / SerialDetector
A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications
☆63Updated 4 years ago
Alternatives and similar repositories for SerialDetector:
Users that are interested in SerialDetector are comparing it to the libraries listed below
- ☆15Updated 3 years ago
- Compiled dataset of Java deserialization CVEs☆61Updated 4 years ago
- ☆78Updated 4 years ago
- GreHack 2021 CodeQL for Java workshop☆75Updated 3 years ago
- ☆34Updated 2 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilities☆71Updated 2 years ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Updated 3 years ago
- tetctf2020_amf_writeups☆23Updated 4 years ago
- Jira未授权SSRF漏洞☆31Updated 5 years ago
- Dependencies with Log4j2 Checklist☆35Updated 3 years ago
- ☆34Updated 5 years ago
- POC for leaking java version through file and ftp protocols☆24Updated 4 years ago
- My CodeQL queries collection☆96Updated last year
- CVE-2020-35728 & Jackson-databind RCE☆42Updated 4 years ago
- Some private tools i decided to release for public.☆49Updated last year
- Library for manually creating Java serialization data.☆29Updated 2 years ago
- None of the exploit code or research is my own but all available in public domain☆28Updated 5 years ago
- ☆35Updated 2 years ago
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Updated 5 years ago
- ☆22Updated 2 years ago
- ☆32Updated 4 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Updated 4 years ago
- Native Java serialization filter blacklist for common gadgets☆20Updated 5 years ago
- Collect public CTF source code repo☆45Updated 3 years ago
- Additional materials for RootedCON 2015 Apache Struts talk☆30Updated 10 years ago
- Gopher Tomcat Deployer☆48Updated 6 years ago
- Our PoC for the vulnerable products☆45Updated 3 years ago
- ☆73Updated 2 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆29Updated 3 years ago