GitHub
github.com › GrrrDog › Java-Deserialization-Cheat-Sheet
GitHub - GrrrDog/Java-Deserialization-Cheat-Sheet: The cheat sheet about Java Deserialization vulnerabilities · GitHub
A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries.
Starred by 3.2K users
Forked by 601 users
GitHub
github.com › Jake-Schoellkopf › Insecure-Java-Deserialization
GitHub - Jake-Schoellkopf/Insecure-Java-Deserialization · GitHub
Both CVEs describe a vulnerability in the Jackson library, and this vulnerability allows attackers to exploit deserialization to achieve Remote Code Execution (RCE) on a server. This is accomplished through enabling "Default Typing" in Jackson ...
Author Jake-Schoellkopf
Videos
47:33
Deserialization exploits in Java: why should I care? by Brian Vermeer ...
08:52
Insecure Deserialization Attack Explained - YouTube
52:13
Deserialization exploits in Java: why should I care? - YouTube
12:04
OWASP insecure deserialization explained with examples - YouTube
51:26
New Exploit Technique In Java Deserialization Attack - YouTube
GitHub
github.com › swisskyrepo › PayloadsAllTheThings › blob › master › Insecure Deserialization › Java.md
PayloadsAllTheThings/Insecure Deserialization/Java.md at master · swisskyrepo/PayloadsAllTheThings
DirectDefense/SuperSerial-Active - Java Deserialization Vulnerability Active Identification Burp Extender
Author swisskyrepo
GitHub
github.com › federicodotta › Java-Deserialization-Scanner
GitHub - federicodotta/Java-Deserialization-Scanner: All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities · GitHub
Java Deserialization Scanner uses custom payloads generated with a modified version of "ysoserial", tool created by frohoff and gebl, to detect Java deserialization vulnerabilities. The original tool (https://github.com/frohoff/ysoserial) generate payloads for the execution of commands on the system, using the Runtime.exec function.
Starred by 801 users
Forked by 179 users
Languages Java
GitHub
github.com › njfox › Java-Deserialization-Exploit
GitHub - njfox/Java-Deserialization-Exploit
This tool builds upon the proof-of-concept ysoserial by Chris Frohoff (https://github.com/frohoff/ysoserial) and exploits the Java Deserialization vulnerability, using Metasploit Framework tools to generate a malicious binary and an embedded ...
Starred by 128 users
Forked by 42 users
Languages Java 100.0% | Java 100.0%
GitHub
github.com › Coalfire-Research › java-deserialization-exploits
GitHub - Coalfire-Research/java-deserialization-exploits: A collection of curated Java Deserialization Exploits
Starred by 591 users
Forked by 218 users
Languages Python 100.0% | Python 100.0%
GitHub
github.com › joaomatosf › JavaDeserH2HC
GitHub - joaomatosf/JavaDeserH2HC: Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).
September 13, 2017 - The lab contains code samples that help you understand deserialization vulnerabilities and how gadget chains exploit them. The goal is to provide a better understanding so that you can develop new payloads and/or better design your environments. There is also a vulnerable testing application (VulnerableHTTPServer.java...
Starred by 517 users
Forked by 115 users
Languages Java 100.0% | Java 100.0%
GitHub
github.com › lorenzodegiorgi › jackson-vulnerability
GitHub - lorenzodegiorgi/jackson-vulnerability: Exploiting Jackson deserialization vulnerability with 3 gadgets · GitHub
Thorugh the getConnection method, DriverManagerConnectionSource downloads the inject.sql file. The inject.sql file leverage a vulnerability in the H2 Java library which, through the command CREATE ALIAS, permits to execute Java code.
Starred by 10 users
Forked by 2 users
Languages Java
GitHub
github.com › frohoff › ysoserial
GitHub - frohoff/ysoserial: A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. · GitHub
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. - frohoff/ysoserial
Starred by 8.9K users
Forked by 1.9K users
Languages Java 99.8% | Dockerfile 0.2%
GitHub
github.com › EdoardoVignati › java-deserialization-of-untrusted-data-poc
GitHub - EdoardoVignati/java-deserialization-of-untrusted-data-poc: Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data · GitHub
Here there are practical examples of the - deserialization of untrusted data - vulnerability. These pocs use the ysoserial tool to generate exploits. ... cd MinimalExample java -jar ../ysoserial-master-v0.0.5-gb617b7b-16.jar CommonsCollections6 "/tmp/exploit.sh">payload.ser cp ./exploit.sh /tmp chmod +x /tmp/exploit.sh javac Employee.java javac DeSerializingObject.java java -classpath .:apache-collections-commons-collections-3.1.jar DeSerializingObject
Starred by 26 users
Forked by 5 users
Languages FreeMarker 35.0% | JavaScript 23.2% | HTML 13.7% | Java 9.1% | CSS 6.0% | Closure Templates 5.0%
GitHub
github.com › maK- › Java-Deserialization-Cheat-Sheet
GitHub - maK-/Java-Deserialization-Cheat-Sheet: The cheat sheet about Java Deserialization vulnerabilities
A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries.
Forked by 3 users
GitHub
github.com › h0ng10 › Java-Deserialization-Cheat-Sheet
GitHub - h0ng10/Java-Deserialization-Cheat-Sheet: The cheat sheet about Java Deserialization vulnerabilities
A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries.
Author h0ng10
GitHub
github.com › klausware › Java-Deserialization-Cheat-Sheet
GitHub - klausware/Java-Deserialization-Cheat-Sheet
A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries.
Author klausware
GitHub
github.com › NHPT › Java_Deserialization_Vulnerability_Experiment
GitHub - NHPT/Java_Deserialization_Vulnerability_Experiment: Java deserialization vulnerability experiment based on fastjson
Java deserialization vulnerability experiment based on fastjson - NHPT/Java_Deserialization_Vulnerability_Experiment
Forked by 2 users
Languages Java 47.6% | CSS 37.6% | JavaScript 14.8% | Java 47.6% | CSS 37.6% | JavaScript 14.8%
GitHub
github.com › gwtproject › gwt › issues › 9709
Java Deserialization vulnerability in GWT-RPC · Issue #9709 · gwtproject/gwt
September 17, 2020 - Since there does not appear to ... it wants and the server will attempt to deserialize it. Deserializing untrusted input is considered a security vulnerability......
Author Medo42