JNDIExploit or a ysoserial.
-
Updated
Nov 1, 2024 - Java
JNDIExploit or a ysoserial.
一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式,适用于与自动化工具配合使用。
CVE-2021-2109 && Weblogic Server RCE via JNDI
A drop in replacement for the standard Tomcat DataSourceFactory that allows the database connection password to be encrypted using a symmetric key for the purposes of security.
Explore the Advanced API Development (AAD) Code Space, featuring in-depth lessons on Jakarta EE, JSON, AJAX, Spring, and security topics. Each lesson is organized into distinct branches, providing practical code examples and real-world scenarios. Dive into comprehensive resources to enhance your API development skills.
JNDI-Exploit is an exploit on Java Naming and Directory Interface (JNDI) from the deleted project fromthe user feihong on GitHub.
Spring boot application that connects to multiple databases using multiple JNDI dataSources configured on apache tomcat server.
My Utility, Servlet 3.0, JAX-RS, CDI, JTA, JSF Tag Libraries and JCA classes for web application development
Example using Azure MSI library from Spring/JNDI application https://github.com/lenisha/msi-mssql-jdbc article:
Sending free Email from Gmail based on Scheduler
Add a description, image, and links to the jndi topic page so that developers can more easily learn about it.
To associate your repository with the jndi topic, visit your repo's landing page and select "manage topics."