A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications
☆63Jan 29, 2021Updated 5 years ago
Alternatives and similar repositories for SerialDetector
Users that are interested in SerialDetector are comparing it to the libraries listed below
Sorting:
- ☆14Jul 14, 2020Updated 5 years ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- A static analysis API for finding deserialization attack gadgets☆38Nov 7, 2022Updated 3 years ago
- Collection of CTF Web challenges I made☆53Apr 25, 2023Updated 2 years ago
- Behinder source code☆175Nov 1, 2021Updated 4 years ago
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆108Jan 26, 2020Updated 6 years ago
- Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js☆75Jan 21, 2024Updated 2 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- AWD 文件监控☆29Sep 14, 2023Updated 2 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- woodpecker框架专用bcel库☆12Apr 30, 2021Updated 4 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- Maintaining account persistence via XSS and Oauth☆77Jan 7, 2019Updated 7 years ago
- tetctf2020_amf_writeups☆23Jan 3, 2021Updated 5 years ago
- ☆14Dec 22, 2020Updated 5 years ago
- A Go library for generating Java deserialization payloads.☆155Sep 9, 2024Updated last year
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,080Jun 15, 2021Updated 4 years ago
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆68Dec 10, 2024Updated last year
- Low-level RASP: Protecting Applications Implemented in High-level Programming Languages☆69Oct 19, 2025Updated 5 months ago
- Client-Side Prototype Pollution Tools☆87Sep 21, 2021Updated 4 years ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- A python-based padding oracle tool☆20Updated this week
- Java After-Deserialization Attack☆79Apr 26, 2021Updated 4 years ago
- Collect public CTF source code repo☆48Sep 26, 2021Updated 4 years ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- ☆43Jan 30, 2023Updated 3 years ago
- 跟.net相关的学习☆88Jun 24, 2024Updated last year
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"☆210Mar 9, 2023Updated 3 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- My security presentations☆29Aug 21, 2023Updated 2 years ago
- Finding Java gadget chains with CodeQL☆185Jan 14, 2025Updated last year
- 清除基于java agent木马☆80Apr 12, 2021Updated 4 years ago
- Some ReadObject Sink With JDBC☆243May 8, 2024Updated last year
- Accelerated execution for fast Windows fuzzing☆25Jan 9, 2025Updated last year
- CVE-2022-29221 Proof of Concept Code - Smarty RCE☆16May 25, 2022Updated 3 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago