kxcode / JNDI-Exploit-Bypass-Demo
Demo code for post <Restrictions of JNDI Manipulation RCE & Bypass>
☆261Updated 2 years ago
Alternatives and similar repositories for JNDI-Exploit-Bypass-Demo:
Users that are interested in JNDI-Exploit-Bypass-Demo are comparing it to the libraries listed below
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.优化了一些东西。☆215Updated 3 years ago
- 利用链、漏洞检测工具☆367Updated 8 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆356Updated 2 years ago
- ☆212Updated 7 months ago
- (周瑜)Java - SpringBoot 持久化 WebShell 学习demo(不仅仅是SpringBoot,适合任何符合JavaEE规范的服务)☆599Updated 3 years ago
- weblogic t3 deserialization rce☆270Updated 7 years ago
- exploit for fastjson remote code execution vulnerability☆152Updated 2 years ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆704Updated 4 years ago
- 一个利用ASM对字节码进行污点传播分析的静态代码审计应用(添加了大量代码注释,适合大家进行源码学习)。也加入了挖掘Fastjson反序列化gadget chains和SQLInject(JdbcTemplate、MyBatis、JPA、Hibernate、原生jdbc等)静…☆445Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆182Updated 3 years ago
- ☆319Updated 3 years ago
- a burp extension to find where use fastjson☆163Updated 5 years ago
- fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.☆226Updated 2 years ago
- JDBC Connection URL Attack☆408Updated 3 years ago
- 自动反编译闭源应用,创建codeql数据库☆304Updated 3 years ago
- 无回显漏洞测试辅助平台,平台使用Java编写,提供DNSLOG,HTTPLOG等功能,辅助渗透测试过程中无回显漏洞及SSRF等漏洞的验证和利用。☆382Updated last year
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆266Updated 3 years ago
- RMI 反序列化环境 一步步☆210Updated 4 years ago
- 注入JVM进程 动态获取目标进程连接的数据库☆316Updated 3 years ago
- Fastjson <= 1.2.47 远程命令执行漏洞利用工具及方法☆399Updated 2 months ago
- CVE-2022-22947☆219Updated 3 years ago
- Shiro-721 RCE Via RememberMe Padding Oracle Attack☆260Updated 4 years ago
- attackRmi☆254Updated 4 years ago
- ☆504Updated 2 years ago
- FilterBased/ServletBased in memory shell for Tomcat and some other middlewares☆366Updated 4 years ago
- tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484…☆213Updated 4 years ago
- ☆235Updated 5 years ago
- 一款通过污点追踪发现Jsp webshell的工具(A tool to find Jsp Webshell through stain tracking)☆175Updated 3 years ago
- 🧬 辅助生成 XRay YAML POC☆265Updated 2 years ago
- Tomcat 冰蝎内存马。☆211Updated 4 years ago