vulhub / JNDIExploit
A malicious LDAP server for JNDI injection attacks
☆52Updated 2 years ago
Alternatives and similar repositories for JNDIExploit
Users that are interested in JNDIExploit are comparing it to the libraries listed below
Sorting:
- A heapdump leaks Shiro key causing RCE vulnerability environment.☆54Updated 11 months ago
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆80Updated last year
- 基于ysoserial扩展命令执行结果回显,生成冰蝎内存马☆88Updated last year
- dubbo快速利用exp,基本上老版本覆盖100%。☆105Updated last year
- 自己积累的一些Java反序列化利用链☆88Updated 2 years ago
- 一款让你不只在dubbo-sample、vulhub或者其他测试环境里检测和利用成功的Apache Dubbo 漏洞检测工具。☆167Updated last year
- 一款探测fastjson漏洞的BurpSuite插件☆61Updated 3 years ago
- ☆55Updated last year
- A list for Spring Security☆123Updated last year
- 支持自动化的切换请求方式、自动化的请求重试、以完整的扫描Springboot路径☆3Updated 3 years ago
- 《JNDI-深入理解Java万恶之源》☆37Updated last year
- springboot跨线程注入内存马☆119Updated 3 years ago
- fastjson 80 远程代码执行漏洞复现☆193Updated 2 years ago
- Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践☆223Updated last year
- Java漏洞分析汇合☆142Updated 3 years ago
- ☆117Updated last year
- MemShell List☆80Updated last year
- xxl-job未授权命令执行☆108Updated 3 years ago
- 哥斯拉nacos后渗透插件 maketoken adduser☆144Updated last year
- 泛微OA_V9全版本的SQL远程代码执行漏洞☆157Updated 3 years ago
- evil-mysql-server is a malicious database written to target jdbc deserialization vulnerabilities and requires ysoserial.☆90Updated 2 years ago
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆106Updated last year
- 用于windows反弹shell的yaml-payload☆71Updated 3 years ago
- 快速遍历目标目录中所有指定后缀文件中包含的敏感信息☆138Updated 2 years ago
- ☆32Updated this week
- 将Goby的json格式Poc转为xray的yaml格式Poc☆132Updated 2 years ago
- Attack cobalt strike server’s FCS by DoW☆71Updated last year
- check hikvision/ys7 api☆71Updated last year
- CVE-2021-34371.jar☆25Updated 3 years ago
- Assassin是一款精简的基于命令行的webshell管理工具,它有着多种payload发送方式和编码方式,以及精简的payload代码,使得它成为隐蔽的暗杀者,难以被很好的防御。☆116Updated 2 years ago