yeshuibo / ysoserial-1Links
ysoserial for su18
☆11Updated 3 years ago
Alternatives and similar repositories for ysoserial-1
Users that are interested in ysoserial-1 are comparing it to the libraries listed below
Sorting:
- CVE-2024-4367 arbitrary js execution in pdf js☆55Updated last year
- 在spring-aop中新发现的反序列化gadget-chain☆52Updated 10 months ago
- Path traversal in Ollama with rogue registry server☆47Updated last year
- JDK CVE-2023-21939☆95Updated 2 years ago
- WebLogic vulnerability exploration from beginner to expert.☆156Updated 2 years ago
- ☆95Updated 2 years ago
- ☆52Updated 7 months ago
- Easy burp sign extension!☆53Updated 9 months ago
- All in one cybersecurity utility platform.☆24Updated 10 months ago
- ☆62Updated 2 years ago
- Collect some security conference topics☆52Updated last year
- ☆33Updated 3 years ago
- cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件☆90Updated 2 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆79Updated 3 years ago
- ☆32Updated last year
- ☆73Updated 3 years ago
- PaddingZip is a tool that you can craft a zip file that contains the padding characters between the file content.☆75Updated 3 years ago
- My security presentations☆28Updated 2 years ago
- Apache RocketMQ Arbitrary File Write Vulnerability Exploit☆45Updated 2 years ago
- xxe oob receive file via web and ftp server☆103Updated 5 years ago
- The Poc for CVE-2024-20931☆74Updated last year
- PyBurp is a Burp Suite extension that provides predefined Python functions for HTTP/WebSocket traffic modification, context menu registra…☆31Updated last month
- POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040☆46Updated last month
- ☆21Updated 4 years ago
- 收录go语言编写的项目、框架和组件出现的cve,或者一些相关的利用方式的文章☆45Updated 2 years ago
- CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行☆92Updated last year
- POC of CVE-2021-2394☆40Updated 4 years ago
- Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)☆72Updated 3 years ago
- 容器安全漏洞的分析与复现☆160Updated last year
- This is a Cheatsheet for CTF Challenges categorized by different Privilege Escalation Methods☆27Updated 6 years ago