A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
-
Updated
Mar 31, 2024 - Java
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
AndroRAT | Remote Administrator Tool for Android OS Hacking
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Android Penetration Tool [ RAT for Android ]
My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)
一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式,适用于与自动化工具配合使用。
A Nintendo DS binary loader for Ghidra
A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell
Automated Twitter mass account creation and follow using Selenium and Tor VPN
CVE-2023-22515
Small crash client base for retarded(german) people who steal other people's code.
Created by The cybersecurity community