JNDI-Exploit-Kit
Exploitation tool
An exploit kit designed to start an HTTP Server, RMI Server and LDAP Server to exploit Java web apps vulnerable to JNDI Injection
JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps vulnerable to JNDI Injection)
903 stars
19 watching
166 forks
Language: Java
last commit: almost 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
waderwu/attackrmi | A tool designed to exploit vulnerabilities in the Java RMI system using various techniques such as deserialization and socket-based attacks. | 250 |
pimps/docker-java-xxe | A Docker image to test XXE attacks in Java with Tomcat using Smarty templates. | 5 |
rpwnage/pwn-my | Exploits a vulnerability in iOS 14.5 WebKit to gain jailbreak access | 647 |
appknox/afe | A framework that enables exploitation of Android devices and applications using Python | 186 |
irsl/jackson-rce-via-spel | A proof-of-concept project demonstrating exploitation of a vulnerability in Jackson-databind via Spring application contexts and expressions. | 121 |
portswigger/json-decoder | Tools for analyzing and manipulating HTTP requests and responses in BurpSuite | 10 |
bgeesaman/subpath-exploit | Demonstrates an escape vulnerability in Kubernetes allowing privileged access to a pod through symlinks | 35 |
arimogi/google-dorks | A collection of tools and techniques for exploiting vulnerabilities in Google services | 45 |
portswigger/reflected-parameters | Tools and techniques for exploiting reflected parameter vulnerabilities in Java-based applications | 19 |
netspi/javaserialkiller | A Burp extension that enables Java Deserialization Attacks using a payload generator tool | 208 |
emilyanncr/windows-post-exploitation | Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing | 524 |
kibercthulhu/gdb-peda-cheatsheet | A collection of tips and tricks for using GDB-PEDA in exploit development | 16 |
rfunix/pompem | Automates searches for exploits and vulnerabilities across multiple databases | 984 |
1n3/intruderpayloads | A collection of tools and methodologies for web application testing and vulnerability assessment. | 3,686 |
mubix/post-exploitation | A collection of post-exploitation tools and scripts for various operating systems. | 1,554 |