Mogwai Java Management Extensions (JMX) Exploitation Toolkit
☆175Jul 21, 2016Updated 9 years ago
Alternatives and similar repositories for mjet
Users that are interested in mjet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆387Apr 16, 2022Updated 4 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- A Java serializer in JavaScript☆81May 21, 2018Updated 7 years ago
- fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java☆403Dec 16, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- some java code i met or i used☆29May 7, 2019Updated 6 years ago
- Java Message Exploitation Tool☆511Jul 6, 2022Updated 3 years ago
- siberas JMX exploitation toolkit☆131Mar 13, 2023Updated 3 years ago
- oracle 10g sys权限通过java执行命令获得一个非交互shell的客户端,通常用于正向连接☆39Jan 4, 2017Updated 9 years ago
- SerialWriter is an incomplete implementation of Java serialization for study of Java deserialization vulnerabilities.☆105Feb 28, 2018Updated 8 years ago
- A static byte code analyzer for Java deserialization gadget research☆252Apr 17, 2017Updated 9 years ago
- JNDI Attacking Tool☆246Jul 11, 2022Updated 3 years ago
- Java every minor versions.☆75Apr 19, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- weblogic t3 deserialization rce☆268Jul 13, 2017Updated 8 years ago
- Apache Solr Injection Research☆581Jan 28, 2020Updated 6 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116May 17, 2019Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11/12☆96Oct 18, 2022Updated 3 years ago
- PowerShell script and Java code to decrypt WebLogic passwords☆246Jul 20, 2015Updated 10 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆43Jan 22, 2016Updated 10 years ago
- Creates a SOCK proxy server that transmits data over an SSRF vulnerability☆114Aug 8, 2012Updated 13 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Java-Web-Security - Sichere Webanwendungen mit Java entwickeln☆222Updated this week
- ☆914Dec 24, 2023Updated 2 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,082Jun 15, 2021Updated 4 years ago
- 一个用于识别目标网站是否采用Struts2框架开发的工具demo☆163Jan 23, 2018Updated 8 years ago
- RCE Exploit PoC for XMLDecoder☆63Aug 1, 2013Updated 12 years ago
- 整理收集Struts2漏洞环境☆271Jan 9, 2018Updated 8 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆803Nov 7, 2021Updated 4 years ago
- Web Server that serves a single file and keeps the connection open until user releases it.☆75Nov 27, 2013Updated 12 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- a new crawler based on python with more function including Network fingerprint search☆504Aug 14, 2018Updated 7 years ago
- PHP Runtime Vulnerability Detection☆480May 25, 2019Updated 6 years ago
- poison and relay NTLM credentials☆175Nov 28, 2018Updated 7 years ago
- YSOSERIAL Integration with burp suite☆165Dec 16, 2022Updated 3 years ago
- IDS Bypass tricks☆122Jan 11, 2019Updated 7 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,175May 26, 2023Updated 2 years ago
- Will to be a niubility scan-framework☆520Jul 1, 2025Updated 10 months ago