potats0 / javaSerializationTools
☆142Updated 4 years ago
Alternatives and similar repositories for javaSerializationTools:
Users that are interested in javaSerializationTools are comparing it to the libraries listed below
- RMI 反序列化环境 一步步☆210Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆102Updated 5 years ago
- fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.☆223Updated 2 years ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆231Updated 4 years ago
- fastjson 1.2.68 版本 autotype bypass☆140Updated 2 years ago
- attackRmi☆252Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆181Updated 3 years ago
- 利用长亭xray高级版的回显Gadget重写的一个shiro反序列化利用工具。☆122Updated 4 years ago
- DSO-Lab 漏洞研究成果整理☆82Updated 2 years ago
- 解密weblogic AES或DES加密方法☆229Updated 4 years ago
- 一款通过污点追踪发现Jsp webshell的工具(A tool to find Jsp Webshell through stain tracking)☆175Updated 3 years ago
- 一款高效的参数fuzz工具|A faster param fuzzing test tool☆100Updated 4 years ago
- struts2 漏洞环境源代码☆75Updated 2 years ago
- ☆96Updated last year
- 又一款敏感文件泄漏检测工具☆104Updated 5 years ago
- ☆61Updated 4 years ago
- Reference:https://www.w2n1ck.com/article/44/☆153Updated 5 years ago
- fastjson不出网利用、c3p0☆251Updated 3 years ago
- shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境☆116Updated 4 years ago
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆266Updated 3 years ago
- JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅助脚本☆257Updated 3 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆257Updated 2 years ago
- 使用java agent反序列化注入内存shell☆67Updated 4 years ago
- Web端POC-EXP 整理☆98Updated 3 years ago
- GUI Exploit Tool For RedTeam☆7Updated 3 years ago
- 中国蚁剑JSP一句话Payload☆120Updated 4 years ago
- 🐸Unauthorized Detection Framework未授权访问检测框架☆158Updated last year
- 关于Struts2框架的历史漏洞个人分析文章☆53Updated 4 years ago
- 用于WebLogic poc及exp测试的基础脚本,后续将集成各版本poc库☆93Updated 4 years ago
- 帮助java环境下任意文件下载情况自动化读取源码的小工具☆165Updated 5 years ago