jas502n / JNDIExploit-1Links
一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式,适用于与自动化工具配合使用。
☆30Updated 3 years ago
Alternatives and similar repositories for JNDIExploit-1
Users that are interested in JNDIExploit-1 are comparing it to the libraries listed below
Sorting:
- 2020年~2021年 网站CMS、中间件、框架系统漏洞集合☆36Updated 4 years ago
- ☆42Updated 5 years ago
- ThinkPHP各版本反序列化利用代码☆33Updated 4 years ago
- CVE-2021-4034, For Webshell Version.☆34Updated 3 years ago
- "打一枪换一个地方" 一个HTTP代理☆41Updated 5 years ago
- CobatStrike-Script, Beacon上线,微信实时推送!☆44Updated 5 years ago
- weblogic-framework☆45Updated 3 years ago
- 魔改的冰蝎,仅供测试连接内存webshell使用☆38Updated 4 years ago
- 端口复用相关思路和工具☆65Updated 5 years ago
- CommonsBeanutils1,CommonsCollectionsK1☆58Updated 4 years ago
- 宽字节安全团队的博客☆31Updated 4 years ago
- 该项目是通过go语言实现防止rmi利用被反置的问题。☆44Updated 3 years ago
- CVE-2021-43297 POC,Apache Dubbo<= 2.7.13时可以实现RCE☆38Updated 3 years ago
- e-mesaage <=4.15 后台jar包上传exp☆47Updated 6 years ago
- 卸载冰蝎内存马☆67Updated 4 years ago
- 集成快速端口扫描服务识别和暴力破解☆45Updated 5 years ago
- X安蜜罐用的一些存在JSonp劫持的API☆94Updated 4 years ago
- some struts tag , attributes which out of the range will call SetDynamicAttribute() function, it will cause ONGL expression execute☆70Updated 4 years ago
- 跟.net相关的学习☆90Updated 11 months ago
- payloads☆15Updated 4 years ago
- jre8u20 gadget☆33Updated 4 years ago
- 就是一个练习RMI反序列化的最简单环境☆30Updated 3 years ago
- shiro 反序列化 回显检测☆39Updated 3 years ago
- Apache Shiro payload AES解密☆28Updated 4 years ago
- 适配mac和linux的crack xray启动☆31Updated 3 years ago
- 使用java agent反序列化注入内存shell☆67Updated 4 years ago
- Yapi RCE漏洞批量验证与伪交互SHELL☆42Updated 3 years ago
- Automatically scan jar packages by using ast to find fastjson gadgets. In particular, this project is limited to mining Gadgets that may …☆50Updated 3 years ago
- Optical Chain Scanner 光链安全扫描器☆56Updated 4 years ago
- ☆46Updated 3 years ago