Ruil1n / after-deserialization-attack
Java After-Deserialization Attack
☆79Updated 3 years ago
Alternatives and similar repositories for after-deserialization-attack:
Users that are interested in after-deserialization-attack are comparing it to the libraries listed below
- bypass JEP290 RaspHook code☆62Updated 4 years ago
- ☆58Updated 4 years ago
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆67Updated 5 years ago
- Writeup and environment for XCTF2021Final-Dubbo☆44Updated 3 years ago
- springboot getRequestURI acl bypass☆37Updated 4 years ago
- ☆42Updated 5 years ago
- PaddingZip is a tool that you can craft a zip file that contains the padding characters between the file content.☆62Updated 2 years ago
- some struts tag , attributes which out of the range will call SetDynamicAttribute() function, it will cause ONGL expression execute☆69Updated 4 years ago
- ☆41Updated 4 years ago
- Spring Boot Actuator + Spring Cloud Vul Env☆19Updated 5 years ago
- 个人用于在自动化挖掘gadget时,方便查找gadget chains中class所在jar包,以助于便 捷审计测试gadget有效性的那么一个小工具。☆60Updated 4 years ago
- RememberMe Padding Oracle Vulnerability RCE☆71Updated 5 years ago
- MySQL JDBC Deserialization Payload / MySQL客户端jdbc反序列化漏洞payload☆13Updated 5 years ago
- fastjson 1.2.68 版本 autotype bypass☆140Updated 2 years ago
- Unofficial Dockerfile and scripts for building CodeQL databases for the OpenJDK☆48Updated last year
- java 漏洞平台包含各种CVE☆23Updated 2 years ago
- CommonsBeanutils1,CommonsCollectionsK1☆58Updated 4 years ago
- ☆69Updated 4 years ago
- 关于Struts2框架的历史漏洞个人分析文章☆53Updated 4 years ago
- Redis RCE 的几种方法☆90Updated 9 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆102Updated 5 years ago
- ☆39Updated 6 years ago
- jre8u20 gadget☆33Updated 3 years ago
- TongASDP漏洞测试环境☆34Updated last year
- ☆4Updated 4 years ago
- 打CTF实在厌倦了找利用链,就知道一个fastjson的版本,一堆依赖找啊找,头都疼。为了解决这个烦恼,用了卓卓师傅的fastjson黑名单工具和库,自己改造了一下。☆32Updated 5 years ago
- Java version of Tomcat-AJP-EXP, for practice☆42Updated 4 years ago
- Shiro RememberMe 1.2.4 反序列化 漏洞☆53Updated 5 years ago
- 一个Java攻击框架☆23Updated 4 years ago
- 几条关于CVE-2020-15148(yii2反序列化)的绕过☆75Updated 4 years ago