Whoopsunix / PPPYSOLinks
proof-of-concept for generating Java deserialization payload | Proxy MemShell
☆206Updated last year
Alternatives and similar repositories for PPPYSO
Users that are interested in PPPYSO are comparing it to the libraries listed below
Sorting:
- 用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入☆283Updated last year
- CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!☆98Updated 10 months ago
- Java Js Engine Payloads All in one☆279Updated 2 years ago
- 无需文件落地Agent内存马生成器☆246Updated last year
- 通过jsp脚本扫描并查杀Tomcat内存马,当前支持Servlet-api、Tomcat-Value、Timer、Websocket 、Upgrade 、ExecutorShell内存马的查杀逻辑。☆63Updated 2 years ago
- 一款让你不只在dubbo-sample、vulhub或者其他测试环境里检测和利用成功的Apache Dubbo 漏洞检测工具。☆169Updated 2 years ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案(修改为使用ceye接收请求,添加自定义DNS服务器)☆293Updated 2 years ago
- 抽离出 utf-8-overlong-encoding 的序列化逻辑,实现 2 3 字节加密序列化数组☆138Updated last year
- Some ReadObject Sink With JDBC☆239Updated last year
- A Java Route Collection Tool☆101Updated last year
- JDBC Attack Tricks☆143Updated 2 years ago
- 基于 jdwp-shellifier 的进阶JDWP漏洞利用脚本(动态执行Java/Js代码并获得回显)☆307Updated 8 months ago
- Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践☆226Updated 2 years ago
- 记录一些代码审计过的源码☆175Updated 6 months ago
- Godzilla插件|内存马|Suo5内存代理|jmg for Godzilla☆230Updated last year
- java实现反序列化建立socket连接☆61Updated 8 months ago
- fastjson 80 远程代码执行漏洞复现☆198Updated 3 years ago
- Abandoned - fastjson 1.2.24-1.2.80 poc & vulns env & how to check vul☆95Updated last year
- 内网集权系统渗透测试笔记☆15Updated 10 months ago
- 强化学习 + 端口扫描☆126Updated 6 months ago
- 不那么一样的 Java Agent 内存马☆286Updated last year
- JavaSec☆40Updated last year
- GodInfo 是一个功能全面的后渗透信息和凭据收集工具,旨在帮助安全测试人员在获得授权访问权限后,快速收集目标系统的信息和凭据。☆225Updated 4 months ago
- JavaPassDump☆265Updated 3 years ago
- 利用代理驱动绕过JDBC Attack检测☆130Updated 2 months ago
- 利用阿里云oss对象存储,来转发http流量实现(cs)Cobalt Strike、msf 上线等 这之间利用阿里云的相关域名进行通信。☆167Updated 2 years ago
- ☆244Updated last year
- Java表达式语句生成器☆194Updated last year
- rmi打内存马工具,适用于目标用不了ldap的情况☆256Updated 2 years ago
- 所有碰到过的默认口令☆104Updated last year