Java-Deserialization-Cheat-Sheet
The cheat sheet about Java Deserialization vulnerabilities (by GrrrDog)
PENTESTING-BIBLE
articles (by blaCCkHatHacEEkr)
Java-Deserialization-Cheat-Sheet | PENTESTING-BIBLE | |
---|---|---|
1 | 3 | |
2,970 | 12,623 | |
- | - | |
2.2 | 1.2 | |
12 months ago | about 1 year ago | |
- | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Java-Deserialization-Cheat-Sheet
Posts with mentions or reviews of Java-Deserialization-Cheat-Sheet.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-02-20.
-
A Study Notes of Exploit Spring Boot Actuator
It can be known that this variable is used to specify the location of the bootstrap configuration file. The supported file formats include ymland properties. Friends who are familiar with Java security may think that the parsing of yml will have a problem of deserialization. If the content of the configuration file is here, we If you can control it, there is a possibility that it can be exploited.
PENTESTING-BIBLE
Posts with mentions or reviews of PENTESTING-BIBLE.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-05-29.
- Bug Bounty Resources
- 🔰 PENTESTING-BIBLE: Aprenda sobre el hacking ético, reconnaissance, hacking Windows y Linux, y #pentesting de redes inalámbricas
- blaCCkHatHacEEkr/PENTESTING-BIBLE - Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
What are some alternatives?
When comparing Java-Deserialization-Cheat-Sheet and PENTESTING-BIBLE you can also consider the following projects:
marshalsec
hacker-roadmap - A collection of hacking tools, resources and references to practice ethical hacking.