Y4Sec-Team / mysql-jdbc-tricks
JDBC Attack Tricks
☆135Updated last year
Related projects ⓘ
Alternatives and complementary repositories for mysql-jdbc-tricks
- 抽离出 utf-8-overlong-encoding 的序列化逻辑,实现 2 3 字节加密序列化数组☆110Updated 8 months ago
- CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!☆67Updated 2 weeks ago
- proof-of-concept for generating Java deserialization payload | Proxy MemShell☆176Updated 5 months ago
- 检测查杀java内存马☆74Updated 11 months ago
- 之前方便自己研究RASP原理和绕过时顺手写的,用于快速启动和重置RASP环境☆51Updated last month
- 一款让你不只在dubbo-sample、vulhub或者其他测试环境里检测和利用成功的Apache Dubbo 漏洞检测工具。☆161Updated last year
- Java 内存马生成插件☆50Updated last year
- ☆110Updated last year
- 多组件客户端☆69Updated 2 months ago
- 如果反序列化过程中使用resolveClass拉黑了TemplatesImpl如何绕过☆47Updated last year
- 用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入☆259Updated last year
- 自己积累的一些Java反序列化利用链☆87Updated last year
- Java表达式语句生成器☆179Updated last year
- 基于污点分析和模拟栈帧技术的JSP Webshell检测☆44Updated last month
- [fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload☆90Updated 2 years ago
- ☆135Updated last year
- A Java Route Collection Tool☆86Updated 3 months ago
- 本工具的定位是快速生成Java安全相关的Payload,如内存马、反序列化链、JNDI url、Fastjson等,动态生成相关Payload,并附带相应的文档。☆90Updated 2 years ago
- MemShell List☆78Updated last year
- Some ReadObject Sink With JDBC☆192Updated 6 months ago
- 一键出网探测工具☆73Updated last year
- 这是一个用Go编写的红队内网环境中一个能快速开启HTTP文件浏览服务的小工具,能够执行shell命令,可以执行webshell☆70Updated last year
- ☆53Updated 11 months ago
- evil-mysql-server is a malicious database written to target jdbc deserialization vulnerabilities and requires ysoserial.☆84Updated 2 years ago
- 基于ysoserial扩展命令执行结果回显,生成冰蝎内存马☆85Updated last year
- 一款办公应用云凭证利用工具☆87Updated 5 months ago
- A Go library for generating Java deserialization payloads.☆158Updated 2 months ago
- A vul-finder for loading CPG and automated finding vul-call-chains☆35Updated last month
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆76Updated last year
- A list for Spring Security☆118Updated 10 months ago