zerothoughts / spring-jndi
Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4
☆116Updated 5 years ago
Alternatives and similar repositories for spring-jndi:
Users that are interested in spring-jndi are comparing it to the libraries listed below
- JRE8u20_RCE_Gadget☆251Updated 8 years ago
- RCE Exploit PoC for XMLDecoder☆63Updated 11 years ago
- Some codes for bypassing Oracle WebLogic CVE-2018-2628 patch☆114Updated 6 years ago
- ☆131Updated 2 years ago
- Struts2-045 Scanner☆73Updated 7 years ago
- Vulnerability Verification Environment based on Docker☆112Updated 5 years ago
- Weblogic-CVE-2018-3191远程代码命令执行漏洞☆65Updated 6 years ago
- Spring messaging STOMP protocol RCE☆114Updated 6 years ago
- St2-052☆55Updated 7 years ago
- ☆1Updated 3 years ago
- 各种漏洞poc、Exp的收集或编写☆33Updated 8 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- CVE-2018-3245-PoC☆167Updated 3 years ago
- CVE-2017-7269 回显PoC ,用于远程漏洞检测..☆87Updated 6 years ago
- ☆83Updated 5 years ago
- ☆51Updated 6 years ago
- ☆1Updated 6 years ago
- Reverse Shell as a Service☆67Updated 4 years ago
- spring mvc cve-2014-3625☆32Updated 9 years ago
- XSS_Filter_Evasion_Cheat_Sheet 中文版☆78Updated 10 years ago
- browser_vuln_check ,利用已知的浏览器漏洞PoC 来快速检测Webview 和浏览器环境是否存在安全漏洞,只需要访问run.html 即可获取所有扫描结果,适用场景包含:APP 发布之前的内部安全测试,第三方Webview 漏洞检测等(browser_vu…☆116Updated 7 years ago
- python audit tool 审计 注入 inject☆34Updated 9 years ago
- fastjson-1.2.47☆66Updated 5 years ago
- 一个适配器模块,用于调用市面上流行的PoC框架(Beebeeto/PocSuite/TangScan/KsPoc)下的PoC.☆94Updated 7 years ago
- ☆51Updated 6 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆172Updated 8 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Updated 7 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Updated 7 years ago
- ☆78Updated 9 years ago
- A plugin to check xss by using chrome_headless☆52Updated 6 years ago