dschadow / Java-Web-Security
Java-Web-Security - Sichere Webanwendungen mit Java entwickeln
☆217Updated this week
Alternatives and similar repositories for Java-Web-Security:
Users that are interested in Java-Web-Security are comparing it to the libraries listed below
- JRE8u20_RCE_Gadget☆252Updated 8 years ago
- QAQ Just study unserialize vulnerabilities in Java :)☆196Updated 6 years ago
- web模糊测试 - 将漏洞可能性放大☆147Updated 5 years ago
- Spring messaging STOMP protocol RCE☆114Updated 6 years ago
- SerialWriter is an incomplete implementation of Java serialization for study of Java deserialization vulnerabilities.☆104Updated 6 years ago
- 一个用于识别目标网站是否采用Struts2框架开发的工具demo☆162Updated 7 years ago
- A vulnerable application exposing Spring Boot Actuators☆121Updated 5 years ago
- Some codes for bypassing Oracle WebLogic CVE-2018-2628 patch☆114Updated 6 years ago
- Java Security Documents☆79Updated 5 years ago
- Web App Monitor☆227Updated 6 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆209Updated 5 years ago
- A Java runtime information-gathering tool which uses the Java Attach API for information acquisition☆204Updated 3 years ago
- wooyun public information backup☆120Updated 7 years ago
- CVE-2018-3245-PoC☆167Updated 3 years ago
- 整理收集Struts2漏洞环境☆261Updated 7 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Updated 7 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆351Updated 2 years ago
- i`m a cat ~ find fish☆92Updated 4 years ago
- exploit for fastjson remote code execution vulnerability☆152Updated 2 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 5 years ago
- ☆84Updated 5 years ago
- Weblogic Upload Vuln(Need username password)-CVE-2019-2618☆172Updated 5 years ago
- OpenRASP 漏洞测试环境☆305Updated last year
- A tool help get the basic information of one site☆109Updated 6 years ago
- tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484…☆213Updated 4 years ago
- Struts2-045 Scanner☆73Updated 7 years ago
- WAF Bypass Cheatsheet☆212Updated 7 years ago
- ☆26Updated 6 years ago
- fastjson-1.2.47☆66Updated 5 years ago
- AnyScan☆101Updated 4 years ago