The web version of Java Payload generation and utilization tool provides Payload generation such as Java deserialization and Hessian 1/2 deserialization, as well as JNDI, Fake MySQL, JRMPListener, etc
-
Updated
Feb 7, 2025
The web version of Java Payload generation and utilization tool provides Payload generation such as Java deserialization and Hessian 1/2 deserialization, as well as JNDI, Fake MySQL, JRMPListener, etc
Java反序列化/JNDI注入/恶意类生成工具,支持多种高版本bypass,支持回显/内存马等多种扩展利用。
POC for Infamous Log4j CVE-2021-44228
CVE 2021-44228 Proof-of-Concept. Log4Shell is an attack against Servers that uses vulnerable versions of Log4J.
Simple Spring Boot application vulnerable to CVE-2021-44228 (a.k.a log4shell)
Some RMI/LDAP servers for exploiting JNDI injections
Log4Shell (CVE-2021-44228): Descrizione, Exploitation e Mitigazione
RCE examples for java eco
Небольшой мод направленный на устранение уязвимости CVE-2021-44228
Add a description, image, and links to the jndi-exploit topic page so that developers can more easily learn about it.
To associate your repository with the jndi-exploit topic, visit your repo's landing page and select "manage topics."