jas502n / JNDIExploit-1Links
一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式,适用于与自动化工具配合使用。
☆30Updated 3 years ago
Alternatives and similar repositories for JNDIExploit-1
Users that are interested in JNDIExploit-1 are comparing it to the libraries listed below
Sorting:
- CVE-2021-4034, For Webshell Version.☆34Updated 3 years ago
- ☆42Updated 5 years ago
- 2020年~2021年 网站CMS、中间件、框架系统漏洞集合☆36Updated 4 years ago
- ThinkPHP各版本反序列化利用代码☆33Updated 4 years ago
- some struts tag , attributes which out of the range will call SetDynamicAttribute() function, it will cause ONGL expression execute☆70Updated 4 years ago
- 端口复用相关思路和工具☆65Updated 5 years ago
- springboot getRequestURI acl bypass☆37Updated 4 years ago
- 魔改的冰蝎,仅供测试连接内存webshell使用☆38Updated 4 years ago
- ☆46Updated 3 years ago
- ☆19Updated 3 years ago
- e-mesaage <=4.15 后台jar包上传exp☆47Updated 6 years ago
- 宽字节安全团队的博客☆31Updated 4 years ago
- 跟.net相关的学习☆90Updated 11 months ago
- Java RMI反序列化漏洞插件☆48Updated 3 years ago
- 该项目是通过go语言实现防止rmi利用被反置的问题。☆44Updated 3 years ago
- 轻便的恶意反代☆48Updated 4 years ago
- log4j tomcat web漏洞环境☆11Updated 3 years ago
- jre8u20 gadget☆33Updated 4 years ago
- Apache Shiro payload AES解密☆28Updated 4 years ago
- CobatStrike-Script, Beacon上线,微信实时推送!☆44Updated 5 years ago
- JVM runtime class loading protection agent.(JVM类加载保护agent)☆48Updated 4 years ago
- Celestion 是一个无回显漏洞测试辅助平台,平台使用flask编写,提供DNSLOG,HTTPLOG等功能。 (界面懒得弄,后续有需要再说)。☆30Updated last year
- CommonsBeanutils1,CommonsCollectionsK1☆58Updated 4 years ago
- "打一枪换一个地方" 一个HTTP代理☆41Updated 5 years ago
- X安蜜罐用的一些存在JSonp劫持的API☆94Updated 4 years ago
- weblogic-framework☆45Updated 3 years ago
- ☆4Updated 4 years ago
- 清除基于java agent木马☆78Updated 4 years ago
- 使用java agent反序列化注入 内存shell☆67Updated 4 years ago
- 分享在建设安全管理体系、ISO27001、等级保护、安全评审过程中的点点滴滴☆23Updated 6 years ago