qingtengyun / cve-2021-44228-qingteng-online-patchLinks
Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.
☆25Updated 3 years ago
Alternatives and similar repositories for cve-2021-44228-qingteng-online-patch
Users that are interested in cve-2021-44228-qingteng-online-patch are comparing it to the libraries listed below
Sorting:
- ☆57Updated 5 years ago
- Java Exp FrameWork☆104Updated 4 years ago
- Java After-Deserialization Attack☆79Updated 4 years ago
- JVM runtime class loading protection agent.(JVM类加载保护agent)☆49Updated 4 years ago
- bypass JEP290 RaspHook code☆62Updated 5 years ago
- slides and papers from (or partly from) Bonan☆22Updated last year
- ☆101Updated 2 years ago
- 一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-442…☆123Updated 4 years ago
- 个人用于在自动化挖掘gadget时,方便查找gadget chains中class所在jar包,以助于便捷审计测试gadget有效性的那么一个小工具。☆60Updated 5 years ago
- 利用agent hock指定的class,在jar运行周期内,用于跟踪被执行的方法,辅助做一些事情,比如挖洞啊☆126Updated 5 years ago
- ☆69Updated 5 years ago
- log4j-patch 修改字节码实现补丁防御☆20Updated 4 years ago
- Use java instrument API without JAR file☆47Updated 3 years ago
- WebLogic T3/IIOP RCE ExternalizableHelper.class of coherence.jar☆80Updated 4 years ago
- MySQL JDBC Deserialization Payload / MySQL客户端jdbc反序列化漏洞payload☆13Updated 5 years ago
- 知识星球《漏洞百出》最新 20条 Topic☆113Updated 4 years ago
- 收集规则☆30Updated 3 years ago
- ☆80Updated 5 years ago
- ☆42Updated 6 years ago
- Apache/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Diffe…☆53Updated 4 years ago
- 一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式 ,适用于与自动化工具配合使用。☆30Updated 4 years ago
- PolicyKit CVE-2021-3560 Exploit (Authentication Agent)☆116Updated 3 years ago
- PaddingZip is a tool that you can craft a zip file that contains the padding characters between the file content.☆76Updated 3 years ago
- xxl-job RESTful API RCE☆74Updated 4 years ago
- JNDI注入测试工具改版(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,et…☆49Updated 5 years ago
- fastjson 1.2.68 版本 autotype bypass☆142Updated 3 years ago
- ☆17Updated 4 years ago
- 使用java agent反序列化注入内存shell☆68Updated 5 years ago
- springboot getRequestURI acl bypass☆37Updated 5 years ago
- some struts tag , attributes which out of the range will call SetDynamicAttribute() function, it will cause ONGL expression execute☆70Updated 4 years ago