kingkaki / ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
☆102Updated 5 years ago
Alternatives and similar repositories for ysoserial:
Users that are interested in ysoserial are comparing it to the libraries listed below
- fastjson 1.2.68 版本 autotype bypass☆140Updated 2 years ago
- ☆61Updated 4 years ago
- bypass JEP290 RaspHook code☆62Updated 4 years ago
- Shiro RCE (Padding Oracle Attack)☆142Updated 5 years ago
- WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)☆58Updated 5 years ago
- Reference:https://www.w2n1ck.com/article/44/☆153Updated 5 years ago
- ☆142Updated 4 years ago
- 又一款敏感文件泄漏检测工具☆104Updated 5 years ago
- RememberMe Padding Oracle Vulnerability RCE☆71Updated 5 years ago
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆67Updated 5 years ago
- RMI 反序列化环境 一步步☆210Updated 4 years ago
- SpringBoot_Actuator_RCE☆97Updated 4 years ago
- DSO-Lab 漏洞研究成果整理☆82Updated 2 years ago
- 🐸fingerprint detect framework 批量深度指纹识别框架☆119Updated 2 years ago
- xxl-job RESTful API RCE☆72Updated 3 years ago
- 关于Struts2框架的历史漏洞个人分析文章☆53Updated 4 years ago
- ☆58Updated 4 years ago
- GUI Exploit Tool For RedTeam☆7Updated 3 years ago
- fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.☆223Updated 2 years ago
- 使用java agent反序列化注入内存shell☆67Updated 4 years ago
- Test repository for verifying compatibility between adjacent minor versions☆35Updated this week
- shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境☆116Updated 4 years ago
- ☆58Updated 4 years ago
- ☆42Updated 5 years ago
- struts2 漏洞环境源代码☆75Updated 2 years ago
- Shiro RememberMe 1.2.4 反序列化 漏洞☆53Updated 5 years ago
- 用于WebLogic poc及exp测试的基础脚本,后续将集成各版本poc库☆93Updated 4 years ago
- ☆80Updated 7 years ago
- 此脚本用于测试 Rdies 未授权访问,在没权限写ssh私钥和定时任务又不知道web绝对路径的情况下,进行WEB目录探测☆73Updated 5 years ago
- 利用长亭xray高级版的回显Gadget重写的一个shiro反序列化利用工具。☆122Updated 4 years ago