kxcode / JNDI-Exploit-Bypass-Demo
Demo code for post <Restrictions of JNDI Manipulation RCE & Bypass>
☆261Updated 2 years ago
Alternatives and similar repositories for JNDI-Exploit-Bypass-Demo:
Users that are interested in JNDI-Exploit-Bypass-Demo are comparing it to the libraries listed below
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.优化了一些东西。☆215Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆355Updated 2 years ago
- 利用链、漏洞检测工具☆367Updated 7 months ago
- fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.☆223Updated 2 years ago
- rmi、jndi、ldap、jrmp、jmx、jms一些demo测试☆308Updated 2 years ago
- weblogic t3 deserialization rce☆268Updated 7 years ago
- exploit for fastjson remote code execution vulnerability☆152Updated 2 years ago
- (周瑜)Java - SpringBoot 持久化 WebShell 学习demo(不仅仅是SpringBoot,适合任何符合JavaEE规范的服务)☆596Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆181Updated 3 years ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆696Updated 3 years ago
- RMI 反序列化环境 一步步☆210Updated 4 years ago
- ☆212Updated 6 months ago
- 一个利用ASM对字节码进行污点传播分析的静态代码审计应用(添加了大量代码注释,适合大家进行源码学习)。也加入了挖掘Fastjson反序列化gadget chains和SQLInject(JdbcTemplate、MyBatis、JPA、Hibernate、原生jdbc等)静…☆446Updated 3 years ago
- 一款通过污点追踪发现Jsp webshell的工具(A tool to find Jsp Webshell through stain tracking)☆175Updated 3 years ago
- Fastjson <= 1.2.47 远程命令执行漏洞利用工具及方法☆399Updated 2 months ago
- 一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-442…☆123Updated 3 years ago
- Tomcat 冰蝎内存马。☆211Updated 4 years ago
- 自动反编译闭源应用,创建codeql数据库☆302Updated 3 years ago
- Struts2漏洞实例源码☆205Updated 4 years ago
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆266Updated 3 years ago
- JDBC Connection URL Attack☆406Updated 3 years ago
- FilterBased/ServletBased in memory shell for Tomcat and some other middlewares☆364Updated 4 years ago
- 给woodpecker框架量身定制的ysoserial☆552Updated 2 years ago
- attackRmi☆252Updated 4 years ago
- Shiro反序列化回显利用、内存shell、检查 Burp插件☆216Updated 2 years ago
- 解密weblogic AES或DES加密方法☆229Updated 4 years ago
- Shiro-721 RCE Via RememberMe Padding Oracle Attack☆257Updated 4 years ago
- CVE-2022-22947☆219Updated 3 years ago
- ☆142Updated 4 years ago
- tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484…☆213Updated 4 years ago