JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps vulnerable to JNDI Injection)
☆937Sep 2, 2025Updated 7 months ago
Alternatives and similar repositories for JNDI-Exploit-Kit
Users that are interested in JNDI-Exploit-Kit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,800Mar 22, 2023Updated 3 years ago
- Java RMI Vulnerability Scanner☆917Jul 3, 2024Updated last year
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆485Dec 9, 2020Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,400Dec 16, 2021Updated 4 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆951Jan 15, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A malicious LDAP server for JNDI injection attacks☆1,078Sep 28, 2023Updated 2 years ago
- jolokia-exploitation-toolkit☆311Dec 19, 2024Updated last year
- Java RCE 回显测试代码☆1,017Oct 15, 2020Updated 5 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- Log4j jndi injects the Payload generator☆487Dec 13, 2021Updated 4 years ago
- ☆3,670Jan 9, 2025Updated last year
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,209Aug 15, 2024Updated last year
- ☆538Nov 20, 2021Updated 4 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Framework for Kerberos relaying☆943May 29, 2022Updated 3 years ago
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆832Aug 4, 2023Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,068Mar 20, 2026Updated 3 weeks ago
- Log4Shell scanner for Burp Suite☆485Sep 24, 2023Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,048Jul 10, 2022Updated 3 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,977Jul 20, 2021Updated 4 years ago
- ZKar is a Java serialization protocol analysis tool implement in Go.☆651Feb 15, 2025Updated last year
- Deserialization payload generator for a variety of .NET formatters☆3,706Dec 23, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- .NET Project for Attacking vCenter☆557Nov 11, 2021Updated 4 years ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,816Sep 4, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- (周瑜)Java - SpringBoot 持久化 WebShell(不仅仅是SpringBoot,适合任何符合JavaEE规范的服务)☆615Dec 29, 2021Updated 4 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆447Sep 7, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,435Nov 23, 2022Updated 3 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆891Jan 3, 2025Updated last year
- JNDI服务利用工具 RMI/LDAP,支持部分场景回显、内存shell,高版本JDK场景下利用等,fastjson rce命令执行,log4j rce命令执行 漏洞 检测辅助工具☆2,016May 21, 2024Updated last year
- Grafana Unauthorized arbitrary file reading vulnerability☆368Feb 14, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆482Nov 20, 2022Updated 3 years ago
- The swiss army knife of LSASS dumping☆2,086Sep 17, 2024Updated last year
- A helpful Java Deserialization exploit framework.☆1,244Feb 17, 2025Updated last year
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,142Apr 26, 2024Updated last year
- ☆1,202Sep 2, 2022Updated 3 years ago
- JDBC Connection URL Attack☆443Sep 10, 2021Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,451Feb 28, 2026Updated last month