eikendev / java-decompilerLinks
A Docker image with four popular Java decompilers in one place (CFR, Fernflower, Krakatau, and Procyon)
☆75Updated 3 years ago
Alternatives and similar repositories for java-decompiler
Users that are interested in java-decompiler are comparing it to the libraries listed below
Sorting:
- 🕳️ Proof of Concept exploits and their descriptions for various products☆25Updated last year
- Dependencies with Log4j2 Checklist☆35Updated 4 years ago
- RCE Exploit for Gitlab < 13.9.4☆51Updated 4 years ago
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regard…☆39Updated 4 years ago
- Ready to use docker image for CodeQL☆90Updated 2 years ago
- Additional materials for RootedCON 2015 Apache Struts talk☆30Updated 10 years ago
- ☆78Updated 5 years ago
- POC for leaking java version through file and ftp protocols☆24Updated 5 years ago
- ☆73Updated 3 years ago
- Use java instrument API without JAR file☆47Updated 3 years ago
- A command-line fuzzer for the Apache JServ Protocol (ajp13)☆95Updated 3 years ago
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Updated 5 years ago
- Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary☆28Updated 5 years ago
- JNDI注入测试工具改版(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,et…☆49Updated 5 years ago
- A fake JDBC driver that allows OS command execution.☆125Updated 3 years ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Updated 4 years ago
- Use requests to send HTTP raw sockets (To Test RFC Compliance)☆24Updated last year
- CLI tool for tracking dependents repositories and sorting result by Stars ⭐☆43Updated 2 years ago
- My CodeQL queries collection☆99Updated 2 years ago
- ☆17Updated 4 years ago
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Updated 6 years ago
- 几条关于CVE-2020-15148(yii2反序列化)的绕过☆75Updated 5 years ago
- ☆15Updated 4 years ago
- CVE-2022-26135☆11Updated 3 years ago
- ☆23Updated 7 years ago
- PolicyKit CVE-2021-3560 Exploit (Authentication Agent)☆116Updated 3 years ago
- My solution for GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Updated 5 years ago
- Poc of CVE-2022-22980☆32Updated 3 years ago
- Web Server that serves a single file and keeps the connection open until user releases it.☆73Updated 12 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Updated 5 years ago