Java deserialization exploitation lab.
☆237Mar 1, 2019Updated 7 years ago
Alternatives and similar repositories for DeserLab
Users that are interested in DeserLab are comparing it to the libraries listed below
Sorting:
- Java serialization brute force attack tool.☆123Aug 18, 2017Updated 8 years ago
- A tool to dump Java serialization streams in a more human readable form.☆1,065Jun 21, 2024Updated last year
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,172May 26, 2023Updated 2 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆522Mar 11, 2022Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆591May 16, 2021Updated 4 years ago
- Vulnerable webapp testbed☆24May 11, 2016Updated 9 years ago
- A static byte code analyzer for Java deserialization gadget research☆251Apr 17, 2017Updated 8 years ago
- fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java☆403Dec 16, 2022Updated 3 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 3 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆801Nov 7, 2021Updated 4 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,516Jan 21, 2020Updated 6 years ago
- ☆3,661Jan 9, 2025Updated last year
- Java 反序列化学习的实验代码 Java_deserialize_vuln_lab☆87Nov 26, 2018Updated 7 years ago
- Java-Web-Security - Sichere Webanwendungen mit Java entwickeln☆221Updated this week
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- java source code static code analysis and danger function identify prog☆534Feb 18, 2019Updated 7 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,812Dec 4, 2025Updated 3 months ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- Web Security Technology & Vulnerability Analysis Whitepapers☆549Jan 1, 2019Updated 7 years ago
- CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script☆140Jul 20, 2018Updated 7 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- .NET Deserialization Passive Scanner☆46Mar 23, 2018Updated 7 years ago
- A fake JDBC driver that allows OS command execution.☆125Oct 2, 2022Updated 3 years ago
- Look-Ahead Java Deserialization Library☆421Jan 7, 2020Updated 6 years ago
- 用于扫描git,svn泄露☆78Jul 29, 2015Updated 10 years ago
- Cure53 Browser Security White Paper☆299Nov 29, 2017Updated 8 years ago
- Code-Audit-Challenges☆991Nov 17, 2018Updated 7 years ago
- Java Message Exploitation Tool☆510Jul 6, 2022Updated 3 years ago
- CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7☆297Aug 8, 2018Updated 7 years ago
- Deserialization payload generator for a variety of .NET formatters☆3,689Dec 23, 2024Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Nov 10, 2018Updated 7 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- a passive scanner based on Mitmproxy and Arachni☆108Aug 17, 2017Updated 8 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,125Apr 21, 2024Updated last year