zema1 / ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
☆350Updated last year
Related projects: ⓘ
- 利用链、漏洞检测工具☆360Updated last month
- Struts2漏洞实例源码☆202Updated 3 years ago
- ☆483Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.优化了一些东西。☆212Updated 2 years ago
- 给woodpecker框架量身定制的ysoserial☆504Updated last year
- ☆320Updated 3 years ago
- FilterBased/ServletBased in memory shell for Tomcat and some other middlewares☆354Updated 3 years ago
- ☆363Updated this week
- 一个高度可定制化的JNDI和Java反序列化利用工具☆442Updated last year
- 🧬 辅助生成 XRay YAML POC☆255Updated last year
- fastjson漏洞burp插件,检测fastjson<1.2.68基于dnslog,fastjson<=1.2.24和1.2.33<=fatjson<=1.2.47的不出网检测和TomcatEcho,SpringEcho回显方案。☆104Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆182Updated 3 years ago
- Shiro-550 不依赖CC链利用工具☆446Updated 3 months ago
- ☆136Updated this week
- SQL 注入利用工具,存在waf的情况下自定义编写tamper脚本 dump数据☆283Updated 4 years ago
- 一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式,适用于与自动化工具配合使用。☆343Updated 2 years ago
- Shiro-721 RCE Via RememberMe Padding Oracle Attack☆254Updated 3 years ago
- ☆128Updated this week
- ☆229Updated 5 years ago
- 内存马Demo合集 memshell demo for java / php / python☆403Updated 3 years ago
- WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell☆528Updated 4 years ago
- JNDI在java高版本的利用工具,FUZZ利用链☆508Updated last year
- 收集内存马打入方式☆489Updated 2 years ago
- fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.☆223Updated last year
- ☆203Updated this week
- 扫描常见未授权访问(redis、mongodb、memcached、elasticsearch、zookeeper、ftp、CouchDB、docker、Hadoop)☆184Updated 4 years ago
- ☆323Updated this week
- Java web路由内存分析工具☆411Updated 3 months ago
- 笔记☆7Updated last week