kingkaki / ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
☆102Updated 5 years ago
Alternatives and similar repositories for ysoserial:
Users that are interested in ysoserial are comparing it to the libraries listed below
- fastjson 1.2.68 版本 autotype bypass☆140Updated 2 years ago
- Shiro RCE (Padding Oracle Attack)☆143Updated 5 years ago
- ☆61Updated 4 years ago
- Reference:https://www.w2n1ck.com/article/44/☆153Updated 5 years ago
- WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)☆59Updated 5 years ago
- bypass JEP290 RaspHook code☆62Updated 4 years ago
- ☆142Updated 4 years ago
- RememberMe Padding Oracle Vulnerability RCE☆71Updated 5 years ago
- ☆58Updated 4 years ago
- SpringBoot_Actuator_RCE☆96Updated 4 years ago
- ☆80Updated 7 years ago
- 🐸fingerprint detect framework 批量深度指纹识别框架☆120Updated 2 years ago
- 利用长亭xray高级版的回显Gadget重写的一 个shiro反序列化利用工具。☆122Updated 4 years ago
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆67Updated 5 years ago
- DSO-Lab 漏洞研究成果整理☆82Updated 2 years ago
- 关于Struts2框架的历史漏洞个人分析文章☆53Updated 4 years ago
- 又一款敏感文件泄漏检测工具☆104Updated 5 years ago
- RMI 反序列化环境 一步步☆210Updated 4 years ago
- 用于WebLogic poc及exp测试的基础脚本,后续将集成各版本poc库☆93Updated 4 years ago
- GUI Exploit Tool For RedTeam☆7Updated 3 years ago
- A simple python script to generate XML payloads works for XMLDecoder based on ProcessBuilder and Runtime exec☆149Updated 4 years ago
- xxl-job RESTful API RCE☆72Updated 3 years ago
- 一款高效的参数fuzz工具|A faster param fuzzing test tool☆100Updated 4 years ago
- Shiro RememberMe 1.2.4 反序列化 漏洞☆53Updated 5 years ago
- 使用java agent反序列化注入内存shell☆67Updated 4 years ago
- reGeorg的特殊版本,适用于老版本weblogic。☆153Updated 4 years ago
- struts2 漏洞环境源代码☆75Updated 2 years ago
- fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.☆226Updated 2 years ago
- 一些结合第三方组件的Fastjson POC,在1.2.48以后版本中陆续被添加至黑名单。☆56Updated 5 years ago
- MySQL JDBC Deserialization Payload / MySQL客户端jdbc反序列化漏洞payload☆13Updated 5 years ago