kxcode / JNDI-Exploit-Bypass-DemoLinks
Demo code for post <Restrictions of JNDI Manipulation RCE & Bypass>
☆267Updated 3 years ago
Alternatives and similar repositories for JNDI-Exploit-Bypass-Demo
Users that are interested in JNDI-Exploit-Bypass-Demo are comparing it to the libraries listed below
Sorting:
- 利用链、漏洞检测工具☆373Updated last year
- rmi、jndi、ldap、jrmp、jmx、jms一些demo测试☆310Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.优化了一些东西。☆214Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆182Updated 4 years ago
- 一个利用ASM对字节码进行污点传播分析的静态代码审计应用(添加了大量代码注释,适合大家进行源码学习)。也加入了挖掘Fastjson反序列化gadget chains和SQLInject(JdbcTemplate、MyBatis、JPA、Hibernate、原生jdbc等)静…☆454Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆357Updated 3 years ago
- fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.☆229Updated 3 years ago
- weblogic t3 deserialization rce☆268Updated 8 years ago
- RMI 反序列化环境 一步步☆215Updated 5 years ago
- ☆213Updated last year
- Shiro-721 RCE Via RememberMe Padding Oracle Attack☆269Updated 5 years ago
- (周瑜)Java - SpringBoot 持久化 WebShell(不仅仅是SpringBoot,适合任何符合JavaEE规范的服务)☆615Updated 4 years ago
- attackRmi☆258Updated 5 years ago
- JDBC Connection URL Attack☆437Updated 4 years ago
- 自动反编译闭源应用,创建codeql数据库☆316Updated 3 years ago
- ☆240Updated 6 years ago
- 一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-442…☆124Updated 4 years ago
- Tomcat 冰蝎内存马。☆214Updated 5 years ago
- redis ssrf gopher generater & redis ssrf to rce by master-slave-sync☆85Updated 5 years ago
- Fastjson <= 1.2.47 远程命令执行漏洞利用工具及方法☆400Updated 11 months ago
- java decompile audit tools☆227Updated 3 years ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆751Updated 4 years ago
- Struts2漏洞实例源码☆209Updated 5 years ago
- 一款通过污点追踪发现Jsp webshell的工具(A tool to find Jsp Webshell through stain tracking)☆176Updated 4 years ago
- 个人笔记☆215Updated 5 years ago
- ☆143Updated 4 years ago
- ☆318Updated 4 years ago
- tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484…☆213Updated 5 years ago
- Awesome environment for antsword tests☆182Updated 4 years ago
- Flask 内存马☆312Updated 4 years ago