wh1t3p1g / ysoserialView external linksLinks
forked from frohoff/ysoserial and added my own payloads.
☆154Mar 6, 2020Updated 5 years ago
Alternatives and similar repositories for ysoserial
Users that are interested in ysoserial are comparing it to the libraries listed below
Sorting:
- A helpful Java Deserialization exploit framework.☆1,239Feb 17, 2025Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆103Mar 10, 2020Updated 5 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆484Dec 9, 2020Updated 5 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- Collection of bypass gadgets to extend and wrap ysoserial payloads☆386Apr 16, 2022Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆183Apr 23, 2021Updated 4 years ago
- Java After-Deserialization Attack☆79Apr 26, 2021Updated 4 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,080Jun 15, 2021Updated 4 years ago
- a webshell resides in the memory of java web server☆699Jun 26, 2018Updated 7 years ago
- CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc pyth…☆133Mar 5, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.优化了一些东西。☆214Jan 17, 2022Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆357Sep 20, 2022Updated 3 years ago
- attackRmi☆258Oct 14, 2020Updated 5 years ago
- Weblogic coherence.jar RCE☆176May 10, 2020Updated 5 years ago
- Collect JSP webshell of various implementation methods. 梳理和发现的JSP Webshell各种姿势☆1,404Jan 18, 2022Updated 4 years ago
- Java RCE 回显测试代码☆1,015Oct 15, 2020Updated 5 years ago
- fastjson 1.2.68 版本 autotype bypass☆142Jun 17, 2022Updated 3 years ago
- RMI 反序列化环境 一步步☆213Aug 31, 2020Updated 5 years ago
- A tool to dump Java serialization streams in a more human readable form.☆1,065Jun 21, 2024Updated last year
- tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484 ,9484…☆212May 19, 2020Updated 5 years ago
- Weblogic IIOP CVE-2020-2551☆340Apr 7, 2020Updated 5 years ago
- ☆3,659Jan 9, 2025Updated last year
- ☆835Jun 7, 2022Updated 3 years ago
- ☆61Sep 21, 2020Updated 5 years ago
- bypass JEP290 RaspHook code☆63Sep 21, 2020Updated 5 years ago
- Fastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)☆1,388Dec 16, 2022Updated 3 years ago
- GreHack 2021 CodeQL for Java workshop☆75Nov 19, 2021Updated 4 years ago
- MySQL Fake Server use to help MySQL Client File Reading and JDBC Client Java Deserialize☆1,359Nov 18, 2021Updated 4 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- (周瑜)Java - SpringBoot 持久化 WebShell(不仅仅是SpringBoot,适合任何符合JavaEE规范的服务)☆615Dec 29, 2021Updated 4 years ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆607May 17, 2019Updated 6 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java☆403Dec 16, 2022Updated 3 years ago
- weblogic t3 deserialization rce☆268Jul 13, 2017Updated 8 years ago
- Demo code for post <Restrictions of JNDI Manipulation RCE & Bypass>☆267Jun 17, 2022Updated 3 years ago
- Java RMI Vulnerability Scanner☆914Jul 3, 2024Updated last year
- Shiro550/Shiro721 一键化利用工具,支持多种回显方式☆1,949Jun 4, 2021Updated 4 years ago