mishmashclone / GrrrDog-Java-Deserialization-Cheat-SheetLinks
https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
☆52Updated 4 years ago
Alternatives and similar repositories for GrrrDog-Java-Deserialization-Cheat-Sheet
Users that are interested in GrrrDog-Java-Deserialization-Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- CVE-2020-36179~82 Jackson-databind SSRF&RCE☆81Updated 4 years ago
- bypass JEP290 RaspHook code☆62Updated 5 years ago
- CVE-2020-8840:FasterXML/jackson-databind 远程代码执行漏洞☆36Updated 5 years ago
- Redis RCE 的几种方法☆90Updated last year
- SpringBoot_Actuator_RCE☆96Updated 5 years ago
- ☆57Updated 5 years ago
- 知识星球《漏洞百出》最新 20条 Topic☆113Updated 4 years ago
- CVE-2020-26259: XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process…☆25Updated 4 years ago
- ☆69Updated 5 years ago
- xxl-job RESTful API RCE☆74Updated 4 years ago
- web fuzzing && bug hunter☆61Updated 4 years ago
- exploit Apache Flink Web Dashboard unauth rce on right way by python2 scripts☆90Updated 6 years ago
- WebLogic T3/IIOP RCE ExternalizableHelper.class of coherence.jar☆80Updated 4 years ago
- Rusty Joomla RCE Exploit☆69Updated 3 years ago
- My collection of various of JSP Webshell.☆36Updated 3 years ago
- Apache/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Diffe…☆53Updated 4 years ago
- Spring Cloud Netflix Hystrix Dashboard template resolution vulnerability CVE-2021-22053☆37Updated 2 years ago
- 几条关于CVE-2020-15148(yii2反序列化)的绕过☆75Updated 5 years ago
- 个人用于在自动化挖掘gadget时,方便查找gadget chains中class所在jar包,以助于便捷审计测试gadget有 效性的那么一个小工具。☆60Updated 5 years ago
- springboot getRequestURI acl bypass☆37Updated 5 years ago
- Java After-Deserialization Attack☆79Updated 4 years ago
- Template Injection in Email Templates leads to code execution on Jira Service Management Server☆48Updated 4 years ago
- some struts tag , attributes which out of the range will call SetDynamicAttribute() function, it will cause ONGL expression execute☆70Updated 4 years ago
- ☆41Updated 5 years ago
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆67Updated 6 years ago
- Java Exp FrameWork☆104Updated 4 years ago
- 一款用于攻击spring boot actuator的集成环境,目前集成三种攻击方式,支持1.x、2.x☆86Updated 4 years ago
- A simple python script to generate XML payloads works for XMLDecoder based on ProcessBuilder and Runtime exec☆149Updated 5 years ago
- shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境☆118Updated 4 years ago
- 又一款敏感文件泄漏检测工具☆105Updated 6 years ago