☆76May 22, 2017Updated 8 years ago
Alternatives and similar repositories for marshalsec
Users that are interested in marshalsec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The cheat sheet about Java Deserialization vulnerabilities☆3,171May 26, 2023Updated 2 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- YSOSERIAL Integration with burp suite☆165Dec 16, 2022Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,842Dec 4, 2025Updated 4 months ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A static byte code analyzer for Java deserialization gadget research☆252Apr 17, 2017Updated 9 years ago
- ☆27Mar 6, 2021Updated 5 years ago
- Deserialization payload generator for a variety of .NET formatters☆3,712Dec 23, 2024Updated last year
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- ☆3,670Jan 9, 2025Updated last year
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 4 years ago
- ☆21Aug 7, 2014Updated 11 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆108May 12, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Sep 20, 2019Updated 6 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆485Dec 9, 2020Updated 5 years ago
- A Burp extension to show the Collaborator client in a tab☆36Dec 23, 2022Updated 3 years ago
- 一个利用ASM对字节码进行污点传播分析的静态代码审计应用(添加了大量代码注释,适合大家进行源码学习)。也加入了挖掘Fastjson反序列化gadget chains和SQLInject(JdbcTemplate、MyBatis、JPA、Hibernate、原生jdbc等)静…☆458Mar 24, 2022Updated 4 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆803Nov 7, 2021Updated 4 years ago
- Burp extension to perform Java Deserialization Attacks☆216Feb 2, 2024Updated 2 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,516Jan 21, 2020Updated 6 years ago
- 年轻时候单纯想法的产物☆17Jan 29, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Java安全相关的漏洞和技术demo,原生Java、Fastjson、Jackson、Hessian2、XML反序列化漏洞利用和Spring、Dubbo、Shiro、CAS、Tomcat、RMI、Nexus等框架\中间件\功能的exploits以及Java Security…☆2,696Mar 14, 2024Updated 2 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Jan 22, 2016Updated 10 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- 基于Docker集群的分布式Openvas(GVM)。本项目包括:GVM-Docker镜像,Openvas-Scanner-Docker镜像,GVM远程调度(golang)。☆30Dec 11, 2020Updated 5 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Aug 5, 2013Updated 12 years ago
- 在学习Java反序列化漏洞的过程中,用来理解Java RMI程序的执行流程,演示如何攻击Java RMI程序的几个示例。☆11May 6, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Java Object Deserialization on Android☆86Apr 11, 2019Updated 7 years ago
- Weblogic Unrestricted File Upload☆54Apr 17, 2019Updated 7 years ago
- 灵芝IAST是一款交互式应用安全评估工具,覆盖了Java WEB相关安全风险的检测,具有近实时检测、准确率高、误报率低、漏洞链路清晰等特点|使用之前请阅读官方文档☆16Jul 18, 2020Updated 5 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Apr 15, 2025Updated last year
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 8 years ago