Y4Sec-Team / mysql-jdbc-tricks
JDBC Attack Tricks
☆138Updated last year
Alternatives and similar repositories for mysql-jdbc-tricks:
Users that are interested in mysql-jdbc-tricks are comparing it to the libraries listed below
- 抽离出 utf-8-overlong-encoding 的序列化逻辑,实现 2 3 字节加密序列化数组☆120Updated 10 months ago
- CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!☆81Updated 2 months ago
- Java 内存马生成插件☆50Updated last year
- 一款让你不只在dubbo-sample、vulhub或者其他测试环境里检测和利用成功的Apache Dubbo 漏洞检测工具。☆167Updated last year
- 多组件客户端☆74Updated 4 months ago
- 之前方便自己研究RASP原理和绕过时顺手写的,用于快速启动和重置RASP环境☆55Updated 3 months ago
- A Java Route Collection Tool☆90Updated 5 months ago
- ☆137Updated 2 years ago
- A Go library for generating Java deserialization payloads.☆158Updated 4 months ago
- 自己积累的一些Java反序列化利用链☆89Updated last year
- ☆55Updated last year
- 如果反序列化过程中使用resolveClass拉黑了TemplatesImpl如何绕过☆49Updated last year
- [fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload☆91Updated 2 years ago
- Some ReadObject Sink With JDBC☆198Updated 8 months ago
- 一款办公应用云凭证利用工具☆90Updated 8 months ago
- 检测查杀java内存马☆76Updated last year
- java实现反序列化建立socket连接☆56Updated last month
- Java命令行文件监控小工具(代码审计)☆100Updated 3 years ago
- MemShell List☆79Updated last year
- Java表达式语句生成器☆185Updated last year
- ☆117Updated last year
- 一键出网探测工具☆73Updated last year
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆79Updated last year
- 在原有yso基础上实现依赖分离,内存马注入等功能。A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆69Updated 3 years ago
- 本工具的定位是快速生成Java安全相关的Payload,如内存马、反序列化链、JNDI url、Fastjson等,动态生成相关Payload,并附带相应的文档。☆90Updated 2 years ago
- 如何将Java反序列化Payload极致缩小☆48Updated 3 years ago
- 用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入☆262Updated last year
- 面向护网,攻防演练等场景下的小型蜜罐☆82Updated 9 months ago
- 某软最新公开gadgegt,新加入不出网利用。☆59Updated 4 months ago
- evil-mysql-server is a malicious database written to target jdbc deserialization vulnerabilities and requires ysoserial.☆87Updated 2 years ago