Ruil1n / after-deserialization-attack
Java After-Deserialization Attack
☆79Updated 3 years ago
Alternatives and similar repositories for after-deserialization-attack:
Users that are interested in after-deserialization-attack are comparing it to the libraries listed below
- ☆58Updated 4 years ago
- bypass JEP290 RaspHook code☆62Updated 4 years ago
- springboot getRequestURI acl bypass☆37Updated 4 years ago
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆67Updated 5 years ago
- 一个Java攻击框架☆23Updated 4 years ago
- Writeup and environment for XCTF2021Final-Dubbo☆44Updated 3 years ago
- some struts tag , attributes which out of the range will call SetDynamicAttribute() function, it will cause ONGL expression execute☆69Updated 4 years ago
- Java version of Tomcat-AJP-EXP, for practice☆42Updated 4 years ago
- ☆41Updated 4 years ago
- 个人用于在自动化挖掘gadget时,方便查找gadget chains中class所在jar包,以助于便捷审计测试gadget有效性的那么一个小工具。☆60Updated 5 years ago
- ☆42Updated 5 years ago
- Redis RCE 的几种方法☆90Updated 10 months ago
- RememberMe Padding Oracle Vulnerability RCE☆71Updated 5 years ago
- Spring Boot Actuator + Spring Cloud Vul Env☆19Updated 5 years ago
- JVM runtime class loading protection agent.(JVM类加载保护agent)☆48Updated 4 years ago
- java 漏洞平台包含各种CVE☆23Updated 2 years ago
- Java Exp FrameWork☆104Updated 4 years ago
- fastjson-1.2.61-RCE☆33Updated 5 years ago
- 宽字节安全团队的博客☆30Updated 4 years ago
- 几条关于CVE-2020-15148(yii2反序列化)的绕过☆75Updated 4 years ago
- fastjson 1.2.68 版本 autotype bypass☆140Updated 2 years ago
- ☆69Updated 4 years ago
- kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609☆89Updated 5 years ago
- 一些Java RASP demo☆11Updated 5 years ago
- solution to buggyLoader of 0CTF/TCTF 2021 Finals☆20Updated 3 years ago
- CommonsBeanutils1,CommonsCollectionsK1☆58Updated 4 years ago
- sqlmap分块传输代理☆49Updated 5 years ago
- Shiro RememberMe 1.2.4 反序列化 漏洞☆53Updated 5 years ago
- 收集规则☆30Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆102Updated 5 years ago