JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps vulnerable to JNDI Injection)
☆941Sep 2, 2025Updated 8 months ago
Alternatives and similar repositories for JNDI-Exploit-Kit
Users that are interested in JNDI-Exploit-Kit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,803Mar 22, 2023Updated 3 years ago
- Java RMI Vulnerability Scanner☆920Jul 3, 2024Updated last year
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆483Dec 9, 2020Updated 5 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆189May 15, 2022Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,400Dec 16, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆951Jan 15, 2022Updated 4 years ago
- A malicious LDAP server for JNDI injection attacks☆1,083Sep 28, 2023Updated 2 years ago
- jolokia-exploitation-toolkit☆317Dec 19, 2024Updated last year
- Java RCE 回显测试代码☆1,014Oct 15, 2020Updated 5 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆616Mar 4, 2021Updated 5 years ago
- Log4j jndi injects the Payload generator☆488Dec 13, 2021Updated 4 years ago
- ☆3,683Jan 9, 2025Updated last year
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,234Aug 15, 2024Updated last year
- ☆539Nov 20, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The cheat sheet about Java Deserialization vulnerabilities☆3,178May 26, 2023Updated 2 years ago
- Framework for Kerberos relaying☆948May 29, 2022Updated 3 years ago
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆832Aug 4, 2023Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,083Apr 29, 2026Updated 3 weeks ago
- Log4Shell scanner for Burp Suite☆485Sep 24, 2023Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,057Jul 10, 2022Updated 3 years ago
- ZKar is a Java serialization protocol analysis tool implement in Go.☆651Apr 19, 2026Updated last month
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,983Jul 20, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Deserialization payload generator for a variety of .NET formatters☆3,724Dec 23, 2024Updated last year
- .NET Project for Attacking vCenter☆559Nov 11, 2021Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- (周瑜)Java - SpringBoot 持久化 WebShell(不仅仅是SpringBoot,适合任何符合JavaEE规范的服务)☆615Dec 29, 2021Updated 4 years ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,821Sep 4, 2024Updated last year
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆449Sep 7, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,431Nov 23, 2022Updated 3 years ago
- JNDI服务利用工具 RMI/LDAP,支持部分场景回显、内存shell,高版本JDK场景下利用等,fastjson rce命令执行,log4j rce命令执行 漏洞检测辅助工具☆2,018May 21, 2024Updated 2 years ago
- Grafana Unauthorized arbitrary file reading vulnerability☆369Feb 14, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tools for Kerberos PKINIT and relaying to AD CS☆903Jan 3, 2025Updated last year
- ☆491Nov 20, 2022Updated 3 years ago
- The swiss army knife of LSASS dumping☆2,114Sep 17, 2024Updated last year
- A helpful Java Deserialization exploit framework.☆1,242Feb 17, 2025Updated last year
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,144Apr 26, 2024Updated 2 years ago
- ☆1,201Sep 2, 2022Updated 3 years ago
- JDBC Connection URL Attack☆450Sep 10, 2021Updated 4 years ago