JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps vulnerable to JNDI Injection)
☆939Sep 2, 2025Updated 8 months ago
Alternatives and similar repositories for JNDI-Exploit-Kit
Users that are interested in JNDI-Exploit-Kit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,798Mar 22, 2023Updated 3 years ago
- Java RMI Vulnerability Scanner☆919Jul 3, 2024Updated last year
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆485Dec 9, 2020Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,400Dec 16, 2021Updated 4 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆951Jan 15, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A malicious LDAP server for JNDI injection attacks☆1,080Sep 28, 2023Updated 2 years ago
- jolokia-exploitation-toolkit☆317Dec 19, 2024Updated last year
- Java RCE 回显测试代码☆1,014Oct 15, 2020Updated 5 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆614Mar 4, 2021Updated 5 years ago
- Log4j jndi injects the Payload generator☆487Dec 13, 2021Updated 4 years ago
- ☆3,680Jan 9, 2025Updated last year
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,225Aug 15, 2024Updated last year
- ☆538Nov 20, 2021Updated 4 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Framework for Kerberos relaying☆946May 29, 2022Updated 3 years ago
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆832Aug 4, 2023Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,075Updated this week
- Log4Shell scanner for Burp Suite☆486Sep 24, 2023Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,054Jul 10, 2022Updated 3 years ago
- ZKar is a Java serialization protocol analysis tool implement in Go.☆652Apr 19, 2026Updated last week
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,979Jul 20, 2021Updated 4 years ago
- Deserialization payload generator for a variety of .NET formatters☆3,717Dec 23, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- .NET Project for Attacking vCenter☆559Nov 11, 2021Updated 4 years ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,815Sep 4, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- (周瑜)Java - SpringBoot 持久化 WebShell(不仅仅是SpringBoot,适合任何符合JavaEE规范的服务)☆615Dec 29, 2021Updated 4 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆448Sep 7, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,431Nov 23, 2022Updated 3 years ago
- JNDI服务利用工具 RMI/LDAP,支持部分场景回显、内存shell,高版本JDK场景下利用等,fastjson rce命令执行,log4j rce命令执行 漏洞检测辅助工具☆2,020May 21, 2024Updated last year
- Grafana Unauthorized arbitrary file reading vulnerability☆368Feb 14, 2023Updated 3 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆896Jan 3, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆490Nov 20, 2022Updated 3 years ago
- The swiss army knife of LSASS dumping☆2,094Sep 17, 2024Updated last year
- A helpful Java Deserialization exploit framework.☆1,241Feb 17, 2025Updated last year
- Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).☆1,142Apr 26, 2024Updated 2 years ago
- ☆1,202Sep 2, 2022Updated 3 years ago
- JDBC Connection URL Attack☆448Sep 10, 2021Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,485Feb 28, 2026Updated 2 months ago