kantega / notsoserialView external linksLinks
Java Agent which mitigates deserialisation attacks by making certain classes unserializable
☆191May 17, 2016Updated 9 years ago
Alternatives and similar repositories for notsoserial
Users that are interested in notsoserial are comparing it to the libraries listed below
Sorting:
- A tiny Java agent that blocks attacks against unsafe deserialization☆86Oct 9, 2017Updated 8 years ago
- Look-Ahead Java Deserialization Library☆422Jan 7, 2020Updated 6 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆386Apr 16, 2022Updated 3 years ago
- Native Java serialization filter blacklist for common gadgets☆20Sep 12, 2019Updated 6 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- A static analysis API for finding deserialization attack gadgets☆38Nov 7, 2022Updated 3 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- A static byte code analyzer for Java deserialization gadget research☆252Apr 17, 2017Updated 8 years ago
- A Java serializer in JavaScript☆81May 21, 2018Updated 7 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- ☆502Mar 10, 2016Updated 9 years ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆35Mar 2, 2020Updated 5 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆799Nov 7, 2021Updated 4 years ago
- Java every minor versions.☆74Apr 19, 2023Updated 2 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,080Jun 15, 2021Updated 4 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 6 years ago
- fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java☆403Dec 16, 2022Updated 3 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- ☆3,659Jan 9, 2025Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 4 years ago
- ☆133Nov 6, 2015Updated 10 years ago
- Java deserialization exploitation lab.☆237Mar 1, 2019Updated 6 years ago
- ☆835Jun 7, 2022Updated 3 years ago
- The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala proje…☆2,411Jun 17, 2025Updated 8 months ago
- Java serialization brute force attack tool.☆123Aug 18, 2017Updated 8 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆519Mar 11, 2022Updated 3 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- Java After-Deserialization Attack☆79Apr 26, 2021Updated 4 years ago
- Java Message Exploitation Tool☆512Jul 6, 2022Updated 3 years ago
- Burp extension to perform Java Deserialization Attacks☆216Feb 2, 2024Updated 2 years ago
- A tool to dump Java serialization streams in a more human readable form.☆1,065Jun 21, 2024Updated last year
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Sep 20, 2019Updated 6 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116May 17, 2019Updated 6 years ago
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆316Apr 1, 2019Updated 6 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,741Dec 4, 2025Updated 2 months ago