LFYSec / Tomcat-AJP-EXPLinks
Java version of Tomcat-AJP-EXP, for practice
☆42Updated 4 years ago
Alternatives and similar repositories for Tomcat-AJP-EXP
Users that are interested in Tomcat-AJP-EXP are comparing it to the libraries listed below
Sorting:
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆67Updated 5 years ago
- fastjson-1.2.61-RCE☆33Updated 5 years ago
- sqlmap分块传输代理☆49Updated 6 years ago
- ☆58Updated 5 years ago
- Java 反序列化学习的实验代码 Java_deserialize_vuln_lab☆87Updated 6 years ago
- A fastjson payload generator☆57Updated 4 years ago
- CVE-2020-10199、CVE-2020-10204、CVE-2020-11444☆35Updated 5 years ago
- ☆82Updated 7 years ago
- Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit☆66Updated 5 years ago
- 参考《利用分块传输吊打所有WAF》修改的requests的Adapter☆98Updated 6 years ago
- bypass JEP290 RaspHook code☆62Updated 4 years ago
- fastjson-1.2.58-rce with h2 database☆34Updated 5 years ago
- Spring Boot Actuator + Spring Cloud Vul Env☆19Updated 5 years ago
- 禅道8.2 - 9.2.1前台Getshell☆78Updated 5 years ago
- kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609☆89Updated 5 years ago
- 个人用于在自动化挖掘gadget时,方便查找gadget chains中class所在jar包,以助于便捷审计测试gadget有效性的那么一个小工具。☆60Updated 5 years ago
- some struts tag , attributes which out of the range will call SetDynamicAttribute() function, it will cause ONGL expression execute☆70Updated 4 years ago
- Redis RCE 的几种方法☆90Updated last year
- Apache ShardingSphere UI YAML解析远程代码执行漏洞☆31Updated 5 years ago
- Shiro RememberMe 1.2.4 反序列化 漏洞☆55Updated 5 years ago
- 注入检测工具☆45Updated 5 years ago
- springboot getRequestURI acl bypass☆37Updated 4 years ago
- Java After-Deserialization Attack☆79Updated 4 years ago
- 此脚本用于测试 Rdies 未授权访问,在没权限写ssh私钥和定时任务又不知道web绝对路径的情况下,进行WEB目录探测☆73Updated 6 years ago
- RememberMe Padding Oracle Vulnerability RCE☆71Updated 5 years ago
- ☆62Updated 5 years ago
- 存放一些自己写过的漏洞利用脚本☆48Updated 5 years ago
- ☆19Updated 4 years ago
- ☆41Updated 4 years ago
- Xray 被动扫描管理☆57Updated 5 years ago