zema1 / ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
☆351Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for ysoserial
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.优化了一些东西。☆213Updated 2 years ago
- 利用链、漏洞检测工具☆367Updated 3 months ago
- 给woodpecker框架量身定制的ysoserial☆523Updated 2 years ago
- fastjson漏洞burp插件,检测fastjson<1.2.68基于dnslog,fastjson<=1.2.24和1.2.33<=fatjson<=1.2.47的不出网检测和TomcatEcho,SpringEcho回显方案。☆113Updated 3 years ago
- Struts2漏洞实例源码☆203Updated 3 years ago
- 一个高度可定制化的JNDI和Java反序列化利用工具☆447Updated last year
- ☆319Updated 3 years ago
- 🧬 辅助生成 XRay YAML POC☆261Updated last year
- FilterBased/ServletBased in memory shell for Tomcat and some other middlewares☆356Updated 4 years ago
- ☆492Updated 2 years ago
- 内存马Demo合集 memshell demo for java / php / python☆404Updated 3 years ago
- 收集内存马打入方式☆497Updated 2 years ago
- ☆233Updated 5 years ago
- SQL 注入利用工具,存在waf的情况下自定义编写tamper脚本 dump数据☆282Updated 4 years ago
- Shiro-721 RCE Via RememberMe Padding Oracle Attack☆254Updated 4 years ago
- Shiro-550 不依赖CC链利用工具☆447Updated 5 months ago
- 扫描常见未授权访问(redis、mongodb、memcached、elasticsearch、zookeeper、ftp、CouchDB、docker、Hadoop)☆185Updated 4 years ago
- JNDI在java高版本的利用工具,FUZZ利用链☆532Updated 2 years ago
- fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.☆223Updated 2 years ago
- WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell☆531Updated 4 years ago
- 在线漏洞平台☆186Updated 3 years ago
- JDBC Connection URL Attack☆390Updated 3 years ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆684Updated 3 years ago
- 通过 Redis 主从写出无损文件☆700Updated 4 years ago
- Redis-Attack By Replication (通过主从复制攻击Redis)☆316Updated last year
- JavaWeb MemoryShell Inject/Scan/Killer/Protect Research & Exploring☆589Updated 3 years ago