kxcode / JNDI-Exploit-Bypass-DemoLinks
Demo code for post <Restrictions of JNDI Manipulation RCE & Bypass>
☆263Updated 3 years ago
Alternatives and similar repositories for JNDI-Exploit-Bypass-Demo
Users that are interested in JNDI-Exploit-Bypass-Demo are comparing it to the libraries listed below
Sorting:
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆183Updated 4 years ago
- 利用链、漏洞检测工具☆371Updated last year
- rmi、jndi、ldap、jrmp、jmx、jms一些demo测试☆310Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.优化了一些东西。☆215Updated 3 years ago
- fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.☆227Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆358Updated 3 years ago
- ☆212Updated last year
- weblogic t3 deserialization rce☆269Updated 8 years ago
- 一个利用ASM对字节码进行污点传播分析的静态代码审计应用(添加了大量代码注释,适合大家进行源码学习)。也加入了挖掘Fastjson反序列化gadget chains和SQLInject(JdbcTemplate、MyBatis、JPA、Hibernate、原生jdbc等)静…☆453Updated 3 years ago
- RMI 反序列化环境 一步步☆215Updated 5 years ago
- 一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-442…☆123Updated 3 years ago
- attackRmi☆258Updated 4 years ago
- JDBC Connection URL Attack☆430Updated 4 years ago
- Shiro-721 RCE Via RememberMe Padding Oracle Attack☆266Updated 4 years ago
- Fastjson <= 1.2.47 远程命令执行漏洞利用工具及方法☆400Updated 8 months ago
- ☆239Updated 6 years ago
- (周瑜)Java - SpringBoot 持久化 WebShell(不仅仅是SpringBoot,适合任何符合JavaEE规范的服务)☆616Updated 3 years ago
- Struts2漏洞实例源码☆208Updated 4 years ago
- 个人笔记☆216Updated 5 years ago
- java decompile audit tools☆228Updated 2 years ago
- 一款通过污点追踪发现Jsp webshell的工具(A tool to find Jsp Webshell through stain tracking)☆178Updated 3 years ago
- ☆142Updated 4 years ago
- Flask 内存马☆311Updated 4 years ago
- 自动反编译闭源应用,创建codeql数据库☆314Updated 3 years ago
- Tomcat 冰蝎内存马。☆214Updated 5 years ago
- exploit for fastjson remote code execution vulnerability☆152Updated 2 years ago
- tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484…☆213Updated 5 years ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆749Updated 4 years ago
- 无回显漏洞测试辅助平台,平台使用Java编写,提供DNSLOG,HTTPLOG等功能,辅助渗透测试过程中无回显漏洞及SSRF等漏洞的验证和利用。☆387Updated 2 months ago
- awesome-java-security-checklist(关于Java安全方面,Java基础/审计/修复/设计/规范)☆128Updated 5 years ago