YSOSERIAL Integration with burp suite
☆41Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for java-serialized-payloads
Users that are interested in java-serialized-payloads are comparing it to the libraries listed below
Sorting:
- 漏洞测试环境 - 方便写扫描器利用复现☆27Aug 12, 2019Updated 6 years ago
- Distinguish the site is used CDN☆18Nov 8, 2018Updated 7 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- ☆33Dec 6, 2022Updated 3 years ago
- https://jira.atlassian.com/browse/JRASERVER-69793☆10Sep 16, 2019Updated 6 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- Weblogic-CVE-2018-3191远程代码命令执行漏洞☆68Oct 24, 2018Updated 7 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- 反弹shell生成器☆17Jul 23, 2018Updated 7 years ago
- ☆83Jan 11, 2018Updated 8 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- CVE-2018-3245☆14Oct 25, 2018Updated 7 years ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- YSOSERIAL Integration with burp suite☆165Dec 16, 2022Updated 3 years ago
- A collection of Nagios plugins that we package.☆41Mar 22, 2016Updated 9 years ago
- All Security Engineering Resources☆15Feb 2, 2018Updated 8 years ago
- Obfuscate specific windows apis with different apis☆12Jul 31, 2024Updated last year
- CVE-2018-3191 反弹shell☆63Oct 23, 2018Updated 7 years ago
- 模拟请求工信部查询备案信息☆12Aug 29, 2018Updated 7 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- some goby poc☆15Apr 11, 2021Updated 4 years ago
- A simple MediaWiki extension to give you control over the html title and meta tags via a tag or parser function.☆17Jul 13, 2019Updated 6 years ago
- IDS Bypass tricks☆122Jan 11, 2019Updated 7 years ago
- ☆17Apr 21, 2017Updated 8 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆19Apr 9, 2018Updated 7 years ago
- 演示dubbo rpc Apache commons collections 的Java序列化漏洞☆42Nov 13, 2015Updated 10 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Jan 22, 2016Updated 10 years ago
- spring mvc cve-2014-3625☆32Mar 11, 2016Updated 10 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- 参考《利用分块传输吊打所有WAF》修改的requests的Adapter☆98Jan 31, 2019Updated 7 years ago
- POC which exploits a vulnerability within Nagios XI (5.6.5) to spawn a root shell☆13Jul 17, 2021Updated 4 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- This repo stores all challenges and writeups of CTFs we have participated in☆35Dec 16, 2018Updated 7 years ago
- CVE-2018-2628 & CVE-2018-2893☆78Jul 20, 2018Updated 7 years ago