jas502n / JNDIExploit-1Links
一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式,适用于与自动化工具配合使用。
☆30Updated 3 years ago
Alternatives and similar repositories for JNDIExploit-1
Users that are interested in JNDIExploit-1 are comparing it to the libraries listed below
Sorting:
- 清除基于java agent木马☆78Updated 4 years ago
- ThinkPHP各版本反序列化利用代码☆33Updated 4 years ago
- ☆42Updated 5 years ago
- 2020年~2021年 网站CMS、中间件、框架系统漏洞集合☆36Updated 4 years ago
- 使用java agent反序列化注入内存shell☆67Updated 4 years ago
- 跟.net相关的学习☆90Updated last year
- Java RMI反序列化漏洞插件☆48Updated 4 years ago
- 宽字节安全团队的博客☆31Updated 4 years ago
- CVE-2021-4034, For Webshell Version.☆34Updated 3 years ago
- CobatStrike-Script, Beacon上线,微信实时推送!☆44Updated 5 years ago
- 端口复用相关思路和工具☆65Updated 5 years ago
- CVE-2021-43297 POC,Apache Dubbo<= 2.7.13时可以实现RCE☆38Updated 3 years ago
- 卸载冰蝎内存马☆67Updated 4 years ago
- 🌏 [WIP]整理好了之后迁移到 cdk-team/document,包含各类容器、K8s攻防场景的CDK文档。☆24Updated 3 years ago
- 魔改的冰蝎,仅供测试连接内存webshell使用☆38Updated 4 years ago
- shiro 反序列化 回显检测☆39Updated 4 years ago
- e-mesaage <=4.15 后台jar包上传exp☆47Updated 6 years ago
- 该项目是通过go语言实现防止rmi利用被反置的问题。☆44Updated 3 years ago
- "打一枪换一个地方" 一个HTTP代理☆41Updated 5 years ago
- springboot getRequestURI acl bypass☆37Updated 4 years ago
- SMTP Netcat , test SMTP protocol☆105Updated 3 years ago
- Automatically scan jar packages by using ast to find fastjson gadgets. In particular, this project is limited to mining Gadgets that may …☆50Updated 3 years ago
- Apereo CAS exploit tool☆58Updated 3 years ago
- DVPNET 公开漏洞知识库☆93Updated 4 years ago
- sprint encode (plan text) get enc password☆44Updated 3 years ago
- 常用安全工具 docker镜像 自动更新仓库☆65Updated 3 years ago
- Apache Shiro payload AES解密☆28Updated 4 years ago
- X安蜜罐用的一些存在JSonp劫持的API☆94Updated 4 years ago
- Optical Chain Scanner 光链安全扫描器☆56Updated 4 years ago
- 一些结合第三方组件的Fastjson POC,在1.2.48以后版本中陆续被添加至黑名单。☆56Updated 5 years ago