vulhub / JNDIExploitLinks
A malicious LDAP server for JNDI injection attacks
☆52Updated 2 years ago
Alternatives and similar repositories for JNDIExploit
Users that are interested in JNDIExploit are comparing it to the libraries listed below
Sorting:
- 一款让你不只在dubbo-sample、vulhub或者其他测试环境里检测和利用成功的Apache Dubbo 漏洞检测工具。☆168Updated last year
- 泛微OA_V9全版本的SQL远程代码执行漏洞☆158Updated 3 years ago
- dubbo快速利用exp,基本上老版本覆盖100%。☆153Updated last month
- A list for Spring Security☆124Updated last year
- Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践☆225Updated 2 years ago
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆109Updated 2 years ago
- 基于ysoserial扩展命令执行结果回显,生成冰蝎内存马☆91Updated 2 years ago
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆82Updated 2 years ago
- 禅道相关poc☆169Updated last year
- ☆56Updated last year
- springboot跨线程注入内存马☆122Updated 3 years ago
- 如何将Java反序列化Payload极致缩小☆56Updated 3 years ago
- 将Goby的json格式Poc转为xray的yaml格式Poc☆133Updated 2 years ago
- JDBC Attack Tricks☆142Updated last year
- 自己积 累的一些Java反序列化利用链☆89Updated 2 years ago
- CVE-2022-22947 注入Godzilla内存马☆209Updated 3 years ago
- fastjson 80 远程代码执行漏洞复现☆196Updated 2 years ago
- 解密哥斯拉webshell管理工具流量☆73Updated 4 years ago
- SpringBootAdmin-thymeleaf-SSTI which can cause RCE☆81Updated 2 years ago
- Java漏洞分析汇合☆142Updated 3 years ago
- Java 内存马生成插件☆54Updated 2 years ago
- 一款探测fastjson漏洞的BurpSuite插件☆61Updated 3 years ago
- 利用代理驱动绕过JDBC Attack检测☆123Updated last month
- Assassin是一款精简的基于命令行的webshell管理工具,它有着多种payload发送方式和编码方式,以及精简的payload代码,使得它成为隐蔽的暗杀者,难以被很好的防御。☆120Updated 3 years ago
- Godzilla java Decode,哥斯拉jsp(内存马)流量解密☆111Updated 3 years ago
- 一款针对于IDE的反制蜜罐 IDE-honeypot☆107Updated 3 years ago
- 用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入☆282Updated last year
- 利用字符集编码绕过waf的burpsuite插件☆123Updated 4 years ago
- Java命令行文件监控小工具(代码审计)☆102Updated 3 years ago
- MemShell List☆83Updated 2 years ago