Skip to content
View kekukele201's full-sized avatar

Block or report kekukele201

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. JavaRce JavaRce Public

    Forked from Whoopsunix/JavaRce

    实战场景较通用的 Java Rce 相关漏洞的利用方式 | Common Exploitation Techniques for Java RCE Vulnerabilities in Real-World Scenarios

    Java

  2. ysoserial ysoserial Public

    Forked from Y4er/ysoserial

    ysoserial修改版,着重修改ysoserial.payloads.util.Gadgets.createTemplatesImpl使其可以通过引入自定义class的形式来执行命令、内存马、反序列化回显。

    Java

  3. JYso JYso Public

    Forked from qi4L/JYso

    It can be either a JNDIExploit or a ysoserial. JYso是一个可以用于 jndi 注入攻击和生成反序列化数据流的工具。

    Java

  4. fastjsonScan fastjsonScan Public

    Forked from zilong3033/fastjsonScan

    fastjson漏洞burp插件,检测fastjson<1.2.68基于dnslog,fastjson<=1.2.24和1.2.33<=fatjson<=1.2.47的不出网检测和TomcatEcho,SpringEcho回显方案。

  5. fastjson-check fastjson-check Public

    Forked from bigsizeme/fastjson-check

    fastjson 被动扫描、不出网payload生成

  6. JNDI-Inject-Exploit JNDI-Inject-Exploit Public

    Forked from exp1orer/JNDI-Inject-Exploit

    解决FastJson、Jackson、Log4j2、原生JNDI注入漏洞的高版本JDKBypass利用,探测本地可用反序列化gadget达到命令执行、回显命令执行、内存马注入

    Java