gabrtv / shocker
Shocker / Docker Breakout PoC
☆117Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for shocker
- ☆235Updated 5 years ago
- ☆112Updated 7 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆56Updated 8 years ago
- ☆143Updated 4 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆172Updated 8 years ago
- A Java serializer in JavaScript☆82Updated 6 years ago
- Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)☆207Updated 5 years ago
- Python Web framework P0wner☆75Updated 11 years ago
- ☆45Updated 8 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆114Updated 6 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆209Updated 5 years ago
- ☆84Updated 7 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆41Updated 11 months ago
- WAF Research☆179Updated 2 years ago
- JRE8u20_RCE_Gadget☆252Updated 8 years ago
- BSidesSF CTF 2017 release☆126Updated 2 years ago
- Vulnerability Verification Environment based on Docker☆112Updated 5 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- Toolset for writing shellcode in Python's Pickle language and for manipulating pickles to inject shellcode.☆79Updated 7 years ago
- ☆133Updated 9 years ago
- PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules☆49Updated 4 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆350Updated 2 years ago
- IDS Bypass tricks☆122Updated 5 years ago
- 各种漏洞poc、Exp的收集或编写☆33Updated 8 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 5 years ago
- wooyun_articles fork from☆19Updated 7 years ago
- A static byte code analyzer for Java deserialization gadget research☆241Updated 7 years ago
- ☆88Updated 3 years ago
- ☆27Updated 3 years ago