Block or Report
Block or report CplusHua
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLists (1)
Sort Name ascending (A-Z)
Stars
Language: Java
Sort by: Most stars
Ghidra is a software reverse engineering (SRE) framework
Alibaba Java Diagnostic Tool Arthas/Alibaba Java诊断利器Arthas
Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)
红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具
shiro反序列化漏洞综合利用,包含(回显执行命令/注入内存马)修复原版中NoCC的问题 https://github.com/j1anFen/shiro_attack
BinAbsInspector: Vulnerability Scanner for Binaries
Shiro RememberMe 1.2.4 反序列化漏洞图形化检测工具(Shiro-550)
ffffffff0x team toolset for penetration testing, cryptography research, CTF and daily use. | ffffffff0x 团队工具集,用来进行渗透测试,密码学研究,CTF和日常使用。
a webshell resides in the memory of java web server
一个利用ASM对字节码进行污点传播分析的静态代码审计应用(添加了大量代码注释,适合大家进行源码学习)。也加入了挖掘Fastjson反序列化gadget chains和SQLInject(JdbcTemplate、MyBatis、JPA、Hibernate、原生jdbc等)静态检测功能。并且加入了很多功能以方便进行漏洞自动化挖掘。
内存马Demo合集 memshell demo for java / php / python
Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4
Extract loaded classes from a running JVM application