mbechler / serianalyzerLinks
A static byte code analyzer for Java deserialization gadget research
☆251Updated 8 years ago
Alternatives and similar repositories for serianalyzer
Users that are interested in serianalyzer are comparing it to the libraries listed below
Sorting:
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆384Updated 3 years ago
- JRE8u20_RCE_Gadget☆255Updated 9 years ago
- Java deserialization exploitation lab.☆237Updated 6 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Updated 9 years ago
- YSOSERIAL Integration with burp suite☆165Updated 3 years ago
- poison and relay NTLM credentials☆176Updated 7 years ago
- A static analysis API for finding deserialization attack gadgets☆38Updated 3 years ago
- When MVC magic turns black☆296Updated 5 years ago
- A vulnerable application exposing Spring Boot Actuators☆123Updated 6 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆109Updated 9 years ago
- JWT Support for Burp☆258Updated last week
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Updated 6 years ago
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆316Updated 6 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆296Updated 2 years ago
- A test suite built with Mocha/Chai to test for behavioral differences between image libraries for the web☆73Updated 5 years ago
- Toolset for writing shellcode in Python's Pickle language and for manipulating pickles to inject shellcode.☆85Updated 8 years ago
- ☆153Updated 6 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆345Updated 3 years ago
- ☆76Updated 8 years ago
- GitHub Satellite 2020 workshops on finding security vulnerabilities with CodeQL for Java/JavaScript.☆211Updated last year
- ☆163Updated 3 months ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Updated 8 years ago
- MOGWAI LABS JMX exploitation toolkit☆206Updated 2 years ago
- ☆108Updated 3 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 6 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Updated 4 years ago
- Utils☆274Updated 10 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Updated last month
- This repo contains the files required to perform a CSRF attack using Flash and HTTP 307 redirections.☆77Updated 7 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆211Updated 6 years ago