LeadroyaL / java_xxe_2019Links
总结了一下2019年在JVM环境中使用XXE攻击的知识
☆57Updated 5 years ago
Alternatives and similar repositories for java_xxe_2019
Users that are interested in java_xxe_2019 are comparing it to the libraries listed below
Sorting:
- Java 反序列化学习的实验代码 Java_deserialize_vuln_lab☆87Updated 6 years ago
- ☆28Updated 5 years ago
- ☆1Updated 6 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆24Updated 5 years ago
- 奇安信报开源软件漏洞cve所用目录。每个人报漏洞请建立自己的目录。☆45Updated 5 years ago
- some java code i met or i used☆29Updated 6 years ago
- Papers☆34Updated 5 years ago
- Apache Log4j 1.2.X存在反序列化远程代码执行漏洞☆78Updated 5 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆23Updated 6 years ago
- 可以直接反弹shell☆47Updated 2 years ago
- 针对域名/页面的接口爬取,递归模式入库☆22Updated 5 years ago
- Burp_Extender_para_encrypter☆39Updated 7 years ago
- CVE-2018-3252-PoC☆74Updated 6 years ago
- ☆62Updated 5 years ago
- kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609☆89Updated 5 years ago
- ☆58Updated 5 years ago
- python security audit tool,用于python源码的代码审计,支持命令注入,sql注入☆62Updated 10 years ago
- 基于burpsuite headless 的代理式被动扫描系统☆96Updated 5 years ago
- VulHint是辅助代码审计的 sublime text 3 插件☆67Updated 6 years ago
- Struts2 vuln env☆43Updated 2 years ago
- Java Security Documents☆80Updated 5 years ago
- ☆41Updated 6 years ago
- SerialWriter is an incomplete implementation of Java serialization for study of Java deserialization vulnerabilities.☆104Updated 7 years ago
- 参考《利用分块传输吊打所有WAF》修改的requests的Adapter☆98Updated 6 years ago
- ☆82Updated 7 years ago
- 个人用于在自动化挖掘gadget时,方便查找gadget chains中class所在jar包,以助于便捷审计测试gadget有效性的那么一个小工具。☆60Updated 5 years ago
- 漏洞测试环境 - 方便写扫描器利用复现☆27Updated 5 years ago
- ☆131Updated 3 years ago
- ☆73Updated 3 years ago
- Make XSS Great Again☆31Updated 5 years ago