René's URL Explorer Experiment


Title: GitHub - e0mlja/JavaSec-1: a rep for documenting my study, may be from 0 to 0.1

Open Graph Title: GitHub - e0mlja/JavaSec-1: a rep for documenting my study, may be from 0 to 0.1

X Title: GitHub - e0mlja/JavaSec-1: a rep for documenting my study, may be from 0 to 0.1

Description: a rep for documenting my study, may be from 0 to 0.1 - e0mlja/JavaSec-1

Open Graph Description: a rep for documenting my study, may be from 0 to 0.1 - e0mlja/JavaSec-1

X Description: a rep for documenting my study, may be from 0 to 0.1 - e0mlja/JavaSec-1

Opengraph URL: https://github.com/e0mlja/JavaSec-1

X: @github

direct link

Domain: patch-diff.githubusercontent.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:939a5c3d-dac9-711e-7111-d8db209cf4ee
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-idE978:1BDF7C:8F4202:BFF7A8:697837D6
html-safe-nonce6b37055f66136a26f4a8581de303993265808daba1af106476114f71da228915
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJFOTc4OjFCREY3Qzo4RjQyMDI6QkZGN0E4OjY5NzgzN0Q2IiwidmlzaXRvcl9pZCI6IjcwNjczMDgwNjM4NzQxMDMyNTQiLCJyZWdpb25fZWRnZSI6ImlhZCIsInJlZ2lvbl9yZW5kZXIiOiJpYWQifQ==
visitor-hmacd84854f632360ad9af461fced0b4e062e4d30732ff2473e013fb4a21958b8928
hovercard-subject-tagrepository:513457133
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/e0mlja/JavaSec-1
twitter:imagehttps://opengraph.githubassets.com/4b0e88ab4bda96dfbd7b69fbed6c543917059f7eb882def4070569eac94b562b/e0mlja/JavaSec-1
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/4b0e88ab4bda96dfbd7b69fbed6c543917059f7eb882def4070569eac94b562b/e0mlja/JavaSec-1
og:image:alta rep for documenting my study, may be from 0 to 0.1 - e0mlja/JavaSec-1
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
None2981c597c945c1d90ac6fa355ce7929b2f413dfe7872ca5c435ee53a24a1de50
turbo-cache-controlno-preview
go-importgithub.com/e0mlja/JavaSec-1 git https://github.com/e0mlja/JavaSec-1.git
octolytics-dimension-user_id50048558
octolytics-dimension-user_logine0mlja
octolytics-dimension-repository_id513457133
octolytics-dimension-repository_nwoe0mlja/JavaSec-1
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forktrue
octolytics-dimension-repository_parent_id467483236
octolytics-dimension-repository_parent_nwoafwu/JavaSec-1
octolytics-dimension-repository_network_root_id418301081
octolytics-dimension-repository_network_root_nwoY4tacker/JavaSec
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release8cc3e064910e26648760f573a358cfc07c97b42c
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fe0mlja%2FJavaSec-1
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fe0mlja%2FJavaSec-1
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=e0mlja%2FJavaSec-1
Reloadhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1
Reloadhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1
Reloadhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1
e0mlja https://patch-diff.githubusercontent.com/e0mlja
JavaSec-1https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1
afwu/JavaSec-1https://patch-diff.githubusercontent.com/afwu/JavaSec-1
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fe0mlja%2FJavaSec-1
Fork 0 https://patch-diff.githubusercontent.com/login?return_to=%2Fe0mlja%2FJavaSec-1
Star 0 https://patch-diff.githubusercontent.com/login?return_to=%2Fe0mlja%2FJavaSec-1
Apache-2.0 license https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/blob/main/LICENSE
0 stars https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/stargazers
339 forks https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/forks
Branches https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/branches
Tags https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tags
Activity https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/activity
Star https://patch-diff.githubusercontent.com/login?return_to=%2Fe0mlja%2FJavaSec-1
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fe0mlja%2FJavaSec-1
Code https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1
Pull requests 0 https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/pulls
Actions https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/actions
Projects 0 https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/projects
Security 0 https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/security
Insights https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/pulse
Code https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1
Pull requests https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/pulls
Actions https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/actions
Projects https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/projects
Security https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/security
Insights https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/pulse
Brancheshttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/branches
Tagshttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tags
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/branches
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tags
422 Commitshttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/commits/main/
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/commits/main/
0.开发学习/SpringBoot2https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/0.%E5%BC%80%E5%8F%91%E5%AD%A6%E4%B9%A0/SpringBoot2
0.开发学习/SpringBoot2https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/0.%E5%BC%80%E5%8F%91%E5%AD%A6%E4%B9%A0/SpringBoot2
1.基础知识https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86
1.基础知识https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86
11.Spring/CVE-2022-22947 SpringCloudGateWay 远程代码执行https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/11.Spring/CVE-2022-22947%20SpringCloudGateWay%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C
11.Spring/CVE-2022-22947 SpringCloudGateWay 远程代码执行https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/11.Spring/CVE-2022-22947%20SpringCloudGateWay%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C
12.Shirohttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/12.Shiro
12.Shirohttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/12.Shiro
13.回显相关技术学习https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/13.%E5%9B%9E%E6%98%BE%E7%9B%B8%E5%85%B3%E6%8A%80%E6%9C%AF%E5%AD%A6%E4%B9%A0
13.回显相关技术学习https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/13.%E5%9B%9E%E6%98%BE%E7%9B%B8%E5%85%B3%E6%8A%80%E6%9C%AF%E5%AD%A6%E4%B9%A0
2.反序列化专区https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA
2.反序列化专区https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA
3.FastJson专区https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/3.FastJson%E4%B8%93%E5%8C%BA
3.FastJson专区https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/3.FastJson%E4%B8%93%E5%8C%BA
4.Weblogic专区https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/4.Weblogic%E4%B8%93%E5%8C%BA
4.Weblogic专区https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/4.Weblogic%E4%B8%93%E5%8C%BA
5.内存马学习https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/5.%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0
5.内存马学习https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/5.%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0
6.JavaAgenthttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/6.JavaAgent
6.JavaAgenthttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/6.JavaAgent
7.Struts2专区https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/7.Struts2%E4%B8%93%E5%8C%BA
7.Struts2专区https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/7.Struts2%E4%B8%93%E5%8C%BA
8.关于Tomcat的一些分享https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/8.%E5%85%B3%E4%BA%8ETomcat%E7%9A%84%E4%B8%80%E4%BA%9B%E5%88%86%E4%BA%AB
8.关于Tomcat的一些分享https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/8.%E5%85%B3%E4%BA%8ETomcat%E7%9A%84%E4%B8%80%E4%BA%9B%E5%88%86%E4%BA%AB
9.JDBC Attackhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/9.JDBC%20Attack
9.JDBC Attackhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/9.JDBC%20Attack
其他https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/%E5%85%B6%E4%BB%96
其他https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/%E5%85%B6%E4%BB%96
填坑文件夹https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/%E5%A1%AB%E5%9D%91%E6%96%87%E4%BB%B6%E5%A4%B9
填坑文件夹https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/%E5%A1%AB%E5%9D%91%E6%96%87%E4%BB%B6%E5%A4%B9
比赛反思/2022/3https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/%E6%AF%94%E8%B5%9B%E5%8F%8D%E6%80%9D/2022/3
比赛反思/2022/3https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/tree/main/%E6%AF%94%E8%B5%9B%E5%8F%8D%E6%80%9D/2022/3
.gitignorehttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/blob/main/.gitignore
.gitignorehttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/blob/main/.gitignore
LICENSEhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/blob/main/LICENSE
LICENSEhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/blob/main/LICENSE
README.mdhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/blob/main/README.md
README.mdhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/blob/main/README.md
READMEhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1
Licensehttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#javasec
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#1基础篇
Java反射https://github.com/Y4tacker/JavaSec/blob/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86/%E5%8F%8D%E5%B0%84/%E5%8F%8D%E5%B0%84.md
补充:通过反射修改用final修饰的变量https://github.com/Y4tacker/JavaSec/tree/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86/%E9%80%9A%E8%BF%87%E5%8F%8D%E5%B0%84%E4%BF%AE%E6%94%B9%E7%94%A8final%E4%BF%AE%E9%A5%B0%E7%9A%84%E5%8F%98%E9%87%8F
Java动态代理https://github.com/Y4tacker/JavaSec/blob/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86/%E5%8A%A8%E6%80%81%E4%BB%A3%E7%90%86/%E5%8A%A8%E6%80%81%E4%BB%A3%E7%90%86.md
JNDI注入https://www.mi1k7ea.com/2019/09/15/%E6%B5%85%E6%9E%90JNDI%E6%B3%A8%E5%85%A5/
反序列化https://www.zhihu.com/question/47794528/answer/672095170
类加载器与双亲委派模型https://github.com/Y4tacker/JavaSec/blob/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86/%E7%B1%BB%E5%8A%A0%E8%BD%BD%E5%99%A8%E4%B8%8E%E5%8F%8C%E4%BA%B2%E5%A7%94%E6%B4%BE%E6%A8%A1%E5%9E%8B/%E7%B1%BB%E5%8A%A0%E8%BD%BD%E5%99%A8%E4%B8%8E%E5%8F%8C%E4%BA%B2%E5%A7%94%E6%B4%BE%E6%A8%A1%E5%9E%8B.md
两种实现Java类隔离加载的方法https://max.book118.com/html/2021/0415/5213012132003221.shtm
ClassLoader(类加载机制)https://github.com/Y4tacker/JavaSec/blob/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86/ClassLoader(%E7%B1%BB%E5%8A%A0%E8%BD%BD%E6%9C%BA%E5%88%B6)/ClassLoader(%E7%B1%BB%E5%8A%A0%E8%BD%BD%E6%9C%BA%E5%88%B6).md
SPI学习https://github.com/Y4tacker/JavaSec/blob/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86/SPI/SPI.md
Java 类字节码编辑https://github.com/Y4tacker/JavaSec/blob/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86/Java%20%E7%B1%BB%E5%AD%97%E8%8A%82%E7%A0%81%E7%BC%96%E8%BE%91/Java%20%E7%B1%BB%E5%AD%97%E8%8A%82%E7%A0%81%E7%BC%96%E8%BE%91.md
JavaAgenthttp://wjlshare.com/archives/1582
JMXhttps://zhuanlan.zhihu.com/p/166530442
JDWP远程执行命令https://www.mi1k7ea.com/2021/08/06/%E6%B5%85%E6%9E%90JDWP%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/
Tomcat中容器的pipeline机制(学了以后更好帮助Tomcat-Valve类型内存马理解)https://www.cnblogs.com/coldridgeValley/p/5816414.html
ASM相关学习(最近慢慢在看,持续学习ing)https://github.com/Y4tacker/JavaSec/tree/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86/ASM%E5%AD%A6%E4%B9%A0
Xpath注入https://github.com/Y4tacker/JavaSec/blob/main/1.%E5%9F%BA%E7%A1%80%E7%9F%A5%E8%AF%86/Xpath%E6%B3%A8%E5%85%A5/index.md
JSTL(看菜鸟教程即可)https://www.runoob.com/jsp/jsp-jstl.html
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#2反序列化
Java反序列化之URLDNShttps://github.com/Y4tacker/JavaSec/blob/main/%E5%85%B6%E4%BB%96/Java%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B9%8BURLDNS/Java%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B9%8BURLDNS.md
CommonsCollections1笔记https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsCollections1/CommonsCollections1.md
CommonsCollections2笔记https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsCollections2/CommonsCollections2.md
CommonsCollections3笔记https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsCollections3/CommonsCollections3.md
CommonsCollections5笔记https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsCollections5/CommonsCollections5.md
CommonsCollections6-HashSet笔记https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsCollections6-HashSet/CommonsCollections6-HashSet.md
CommonsCollections6-HashMap笔记https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsCollections6-HashMap/CommonsCollections6-HashMap.md
CommonsCollections6-Shiro1.2.4笔记https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsCollections6-Shiro1.2.4/CommonsCollections6-Shiro1.2.4.md
CommonsCollections7笔记https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsCollections7/CommonsCollections7.md
使用TemplatesImpl改造CommonsCollections2https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/%E4%BD%BF%E7%94%A8TemplatesImpl%E6%94%B9%E9%80%A0CommonsCollections2/%E4%BD%BF%E7%94%A8TemplatesImpl%E6%94%B9%E9%80%A0CommonsCollections2.md
CommonsBeanutils1笔记https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsBeanutils1/CommonsBeanutils1%E7%AC%94%E8%AE%B0.md
CommonsBeanutils1-Shiro(无CC依赖)https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsBeanutils1-Shiro(%E6%97%A0CC%E4%BE%9D%E8%B5%96)/CommonsBeanutils1-Shiro(%E6%97%A0CC%E4%BE%9D%E8%B5%96).md
FileUpload1-写文件\删除文件https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/FileUpload/index.md
C3P0利用链简单分析https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/C3P0/C3P0.md
C3P0Tomcat不出网利用(思路就是之前高版本JNDI注入的思路)http://www.yulegeyu.com/2021/10/10/JAVA%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B9%8BC3P0%E4%B8%8D%E5%87%BA%E7%BD%91%E5%88%A9%E7%94%A8/
反制Ysoserial0.0.6版本-JRMP(打个标签weblogic搞定后看看)https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/%E5%8F%8D%E5%88%B6Ysoserial0.0.6%E7%89%88%E6%9C%AC-JRMP/%E5%8F%8D%E5%88%B6Ysoserial0.0.6%E7%89%88%E6%9C%AC-JRMP.md
网上看到的神秘套娃CommonsCollections11https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/CommonsCollections11/CommonsCollections11.md
SnakeYAML反序列化及可利用Gadgethttps://y4tacker.github.io/2022/02/08/year/2022/2/SnakeYAML%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%8F%8A%E5%8F%AF%E5%88%A9%E7%94%A8Gadget%E5%88%86%E6%9E%90/
SnakeYAML出网探测Gadget(自己瞎琢磨出来的,不过在1.7以下版本就不行)https://y4tacker.github.io/2022/02/08/year/2022/2/SnakeYAML%E5%AE%9E%E7%8E%B0Gadget%E6%8E%A2%E6%B5%8B/
XStream反序列化学习https://y4tacker.github.io/2022/02/10/year/2022/2/XStream%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96/
Java反序列化数据绕WAF之加大量脏数据 | 回忆飘如雪 (gv7.me)https://gv7.me/articles/2021/java-deserialize-data-bypass-waf-by-adding-a-lot-of-dirty-data/
Java反序列化脏数据新姿势-对大师傅的姿势补充(个人的小研究)https://y4tacker.github.io/2022/02/05/year/2022/2/%E5%AF%B9Java%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%95%B0%E6%8D%AE%E7%BB%95WAF%E6%96%B0%E5%A7%BF%E5%8A%BF%E7%9A%84%E8%A1%A5%E5%85%85/
解决反序列化serialVesionUID不一致问题(BestMatch:打破双亲委派对jbxz用工具最方便)https://gv7.me/articles/2020/deserialization-of-serialvesionuid-conflicts-using-a-custom-classloader/
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#3fastjson专区
Fastjson基本用法https://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/Fastjson%E5%9F%BA%E6%9C%AC%E7%94%A8%E6%B3%95/Fastjson%E5%9F%BA%E6%9C%AC%E7%94%A8%E6%B3%95.md
Fastjson1.1.15-1.2.4与BCEL字节码加载https://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/Fastjson1.1.15-1.2.4%E4%B8%8EBCEL%E5%AD%97%E8%8A%82%E7%A0%81%E5%8A%A0%E8%BD%BD/Fastjson1.1.15-1.2.4%E4%B8%8EBCEL%E5%AD%97%E8%8A%82%E7%A0%81%E5%8A%A0%E8%BD%BD.md
Fastjson1.22-1.24反序列化分析之JNDIhttps://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/Fastjson1.22-1.24/Fastjson1.22-1.24%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%88%86%E6%9E%90%E4%B9%8BJNDI/Fastjson1.22-1.24.md
Fastjson1.22-1.24反序列化分析之TemplateImplhttps://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/Fastjson1.22-1.24/Fastjson1.22-1.24%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%88%86%E6%9E%90%E4%B9%8BTemplateImpl/Fastjson1.22-1.24.md
Fastjson1.2.25-1.2.41补丁绕过(用L;绕过、需要开启autotype)https://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/Bypass/Fastjson1.2.25-1.2.41%E8%A1%A5%E4%B8%81%E7%BB%95%E8%BF%87/Fastjson1.2.25-1.2.41%E8%A1%A5%E4%B8%81%E7%BB%95%E8%BF%87.md
Fastjson1.2.25-1.2.42补丁绕过(双写L;绕过、需要开启autotype)https://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/Bypass/Fastjson1.2.25-1.2.42%E8%A1%A5%E4%B8%81%E7%BB%95%E8%BF%87/Fastjson1.2.25-1.2.42%E8%A1%A5%E4%B8%81%E7%BB%95%E8%BF%87.md
Fastjson1.2.25-1.2.43补丁绕过(用左中括号绕过、需要开启autotype)https://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/Bypass/Fastjson1.2.25-1.2.43%E8%A1%A5%E4%B8%81%E7%BB%95%E8%BF%87/Fastjson1.2.25-1.2.43%E8%A1%A5%E4%B8%81%E7%BB%95%E8%BF%87.md
Fastjson1.2.25-1.2.45补丁绕过(mybatis的3.x版本且<3.5.0、需要开启autotype)https://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/Bypass/Fastjson1.2.25-1.2.45%E8%A1%A5%E4%B8%81%E7%BB%95%E8%BF%87/Fastjson1.2.25-1.2.45%E8%A1%A5%E4%B8%81%E7%BB%95%E8%BF%87.md
Fastjson1.2.25-1.2.47绕过https://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/Bypass/Fastjson1.2.25-1.2.47%E7%BB%95%E8%BF%87%E6%97%A0%E9%9C%80AutoType/Fastjson1.2.25-1.2.47%E7%BB%95%E8%BF%87%E6%97%A0%E9%9C%80AutoType.md
Fastjson1.2.48-1.2.68反序列化漏洞https://www.anquanke.com/post/id/232774
Fastjson1.2.68不使用ref引用,不用parseObject触发get方法https://su18.org/post/fastjson-1.2.68/#getter-%E6%96%B9%E6%B3%95%E8%B0%83%E7%94%A8
关于blackhat2021披露的fastjson1.2.68链的一些细节,防止公众号以后找不到同目录下有备份https://mp.weixin.qq.com/s?__biz=MzUzNDMyNjI3Mg==&mid=2247484866&idx=1&sn=23fb7897f6e54cdf61031a65c602487d&scene=21#wechat_redirect
2021L3HCTF中关于Fastjson1.2.68的骚操作https://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/%E5%85%B6%E4%BB%96/L3HCTF%202021%20Official%20Write%20Up.pdf
一些有趣的Trickhttps://github.com/Y4tacker/JavaSec/blob/main/3.FastJson%E4%B8%93%E5%8C%BA/%E6%9C%89%E8%B6%A3Trick/FastJson%20Trick.md
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#4weblogic专区暂时不想看
T3协议学习https://github.com/Y4tacker/JavaSec/blob/main/4.Weblogic%E4%B8%93%E5%8C%BA/T3%E5%8D%8F%E8%AE%AE%E5%AD%A6%E4%B9%A0/T3%E5%8D%8F%E8%AE%AE%E5%AD%A6%E4%B9%A0.md
CVE-2015-4852复现分析https://github.com/Y4tacker/JavaSec/blob/main/4.Weblogic%E4%B8%93%E5%8C%BA/CVE-2015-4852%E5%A4%8D%E7%8E%B0%E5%88%86%E6%9E%90/CVE-2015-4852%E5%A4%8D%E7%8E%B0%E5%88%86%E6%9E%90.md
Weblogic使用ClassLoader和RMI来回显命令执行结果https://xz.aliyun.com/t/7228
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#5内存马学习专区
JavaWeb与Tomcat介绍https://github.com/Y4tacker/JavaSec/blob/main/5.%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0/Tomcat/Tomcat%E4%BB%8B%E7%BB%8D/Tomcat%E4%BB%8B%E7%BB%8D.md
Tomcat-Listener型内存马https://github.com/Y4tacker/JavaSec/blob/main/5.%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0/Tomcat/Tomcat-Listener%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC/Tomcat-Listener%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC.md
Tomcat-Filter型内存马https://github.com/Y4tacker/JavaSec/blob/main/5.%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0/Tomcat/Tomcat-Filter%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC/Tomcat-Filter%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC.md
Tomcat-Servlet型内存马https://github.com/Y4tacker/JavaSec/blob/main/5.%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0/Tomcat/Tomcat-Servlet%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC/Tomcat-Servlet%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC.md
Tomcat-Valve内存马https://mp.weixin.qq.com/s/x4pxmeqC1DvRi9AdxZ-0Lw
浅谈 Java Agent 内存马(网上看到大师傅写的很详细直接搬运工了)http://wjlshare.com/archives/1582
SpringBoot内存马学习-通过添加新路由https://github.com/Y4tacker/JavaSec/tree/main/5.%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0/Spring/%E9%92%88%E5%AF%B9springboot%E7%9A%84controller%E5%86%85%E5%AD%98%E9%A9%AC
利用intercetor注入Spring内存马https://github.com/Y4tacker/JavaSec/blob/main/5.%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0/Spring/%E5%88%A9%E7%94%A8intercetor%E6%B3%A8%E5%85%A5Spring%E5%86%85%E5%AD%98%E9%A9%AC/index.md
Timer型内存马https://github.com/Y4tacker/JavaSec/blob/main/5.%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0/Tomcat/Timer%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC/index.md
看不见的Jsp-Webshell(有点像平时CTF里面php的不死马的效果)https://mp.weixin.qq.com/s/1ZiLD396088TxiW_dUOFsQ
看不见的 Jsp-WebShell 第二式增强之无痕https://mp.weixin.qq.com/s/7b3Fyu_K6ZRgKlp6RkdYoA
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#6javaagent学习专区
Java Instrument插桩技术初体验https://github.com/Y4tacker/JavaSec/blob/main/6.JavaAgent/JavaInstrument%E6%8F%92%E6%A1%A9%E6%8A%80%E6%9C%AF/JavaInstrument%E6%8F%92%E6%A1%A9%E6%8A%80%E6%9C%AF.md
PreMain之addTransformer与redefineClasses用法学习https://github.com/Y4tacker/JavaSec/blob/main/6.JavaAgent/PreMain%E4%B9%8BaddTransformer%E4%B8%8EredefineClasses%E7%94%A8%E6%B3%95%E5%AD%A6%E4%B9%A0/PreMain%E4%B9%8BaddTransformer%E4%B8%8EredefineClasses%E7%94%A8%E6%B3%95%E5%AD%A6%E4%B9%A0.md
AgentMain(JVM启动后动态Instrument)https://github.com/Y4tacker/JavaSec/blob/main/6.JavaAgent/AgentMain/AgentMain.md
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#7struts2学习专区暂时决定停止学习
Struts2简介与漏洞环境搭建https://github.com/Y4tacker/JavaSec/blob/main/7.Struts22%E4%B8%93%E5%8C%BA/%E7%8E%AF%E5%A2%83%E6%90%AD%E5%BB%BA/%E7%8E%AF%E5%A2%83%E6%90%AD%E5%BB%BA.md
Struts2框架处理流程与Struts2-001漏洞分析(Struts 2.0.0-Struts 2.0.8)https://github.com/Y4tacker/JavaSec/blob/main/7.Struts2%E4%B8%93%E5%8C%BA/Struts2%E6%A1%86%E6%9E%B6%E5%A4%84%E7%90%86%E6%B5%81%E7%A8%8B/Struts2%E6%A1%86%E6%9E%B6%E5%A4%84%E7%90%86%E6%B5%81%E7%A8%8B%E4%B8%8EStruts2-001.md
S2-002漏洞分析(Struts 2.0.0 - Struts 2.1.8.1)https://github.com/Y4tacker/JavaSec/blob/main/7.Struts2%E4%B8%93%E5%8C%BA/S2-002%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/S2-002%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90.md
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#8关于tomcat的一些小发现个人小研究
JSTL的可利用点https://github.com/Y4tacker/JavaSec/blob/main/8.%E5%85%B3%E4%BA%8ETomcat%E7%9A%84%E4%B8%80%E4%BA%9B%E5%88%86%E4%BA%AB/JSTL%E7%9A%84%E5%8F%AF%E5%88%A9%E7%94%A8%E7%82%B9/index.md
一次jsp的奇异探索https://github.com/Y4tacker/JavaSec/blob/main/8.%E5%85%B3%E4%BA%8ETomcat%E7%9A%84%E4%B8%80%E4%BA%9B%E5%88%86%E4%BA%AB/%E4%B8%80%E6%AC%A1jsp%E7%9A%84%E5%A5%87%E5%BC%82%E6%8E%A2%E7%B4%A2/1.md
Tomcat写文件新利用思路https://github.com/Y4tacker/JavaSec/blob/main/8.%E5%85%B3%E4%BA%8ETomcat%E7%9A%84%E4%B8%80%E4%BA%9B%E5%88%86%E4%BA%AB/Tomcat%E5%86%99%E6%96%87%E4%BB%B6%E6%96%B0%E5%88%A9%E7%94%A8%E6%80%9D%E8%B7%AF/DC.md
两个关于Tomcat的问题https://github.com/Y4tacker/JavaSec/blob/main/8.%E5%85%B3%E4%BA%8ETomcat%E7%9A%84%E4%B8%80%E4%BA%9B%E5%88%86%E4%BA%AB/%E4%B8%A4%E4%B8%AA%E5%85%B3%E4%BA%8ETomcat%E7%9A%84%E9%97%AE%E9%A2%98/1.md
Java文件上传大杀器-绕waf(针对commons-fileupload组件)https://github.com/Y4tacker/JavaSec/blob/main/8.%E5%85%B3%E4%BA%8ETomcat%E7%9A%84%E4%B8%80%E4%BA%9B%E5%88%86%E4%BA%AB/Common-fileupload%E7%BB%84%E4%BB%B6%E7%BB%95%E8%BF%87/Java%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E5%A4%A7%E6%9D%80%E5%99%A8-%E7%BB%95waf(%E9%92%88%E5%AF%B9commons-fileupload%E7%BB%84%E4%BB%B6).md
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#9jdbc-attack
探索高版本 JDK 下 JNDI 漏洞的利用方法https://tttang.com/archive/1405/
MySQL-JDBC-反序列化漏洞https://github.com/Y4tacker/JavaSec/blob/main/2.%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%93%E5%8C%BA/MySQL-JDBC-%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E/MySQL%20JDBC-%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E.md
MySQL JDBC 客户端反序列化漏洞分析https://www.anquanke.com/post/id/203086
对fnmsd关于detectCustomCollations触发点的版本纠正https://xz.aliyun.com/t/10923
H2-RCEhttps://github.com/Y4tacker/JavaSec/blob/main/9.JDBC%20Attack/h2/index.md
ModeShape-JNDIhttps://github.com/Y4tacker/JavaSec/blob/main/9.JDBC%20Attack/ModeShape/index.md
IBM DB2-JNDIhttps://github.com/Y4tacker/JavaSec/blob/main/9.JDBC%20Attack/IBM-DB2/index.md
Apache Derby可触发反序列化https://github.com/Y4tacker/JavaSec/blob/main/9.JDBC%20Attack/Apache-Derby/index.md
SQLite SSRFhttps://github.com/Y4tacker/JavaSec/blob/main/9.JDBC%20Attack/SQLite/index.md
PostgreSQL-RCE(敌不动我不动,你先发poc我放心)https://github.com/Y4tacker/JavaSec/blob/main/9.JDBC%20Attack/PostGreSQL/index.md
Make JDBC Attacks Brilliant Again 番外篇https://tttang.com/archive/1462/
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#10关于jndi的整理
Java RMI 攻击由浅入深(深入源码,师傅写的很好)https://su18.org/post/rmi-attack/
如何绕过高版本 JDK 的限制进行 JNDI 注入利用https://paper.seebug.org/942/#classreference-factory
高低版JDK下的JNDI注入绕过流程跟踪(Jdk8u191+)https://github.com/Y4tacker/JavaSec/blob/main/%E5%85%B6%E4%BB%96/%E9%AB%98%E4%BD%8E%E7%89%88JDK%E4%B8%8B%E7%9A%84JNDI%E6%B3%A8%E5%85%A5%E7%BB%95%E8%BF%87%E6%B5%81%E7%A8%8B%E8%B7%9F%E8%B8%AA/%E9%AB%98%E4%BD%8E%E7%89%88JDK%E4%B8%8B%E7%9A%84JNDI%E6%B3%A8%E5%85%A5%E7%BB%95%E8%BF%87%E6%B5%81%E7%A8%8B%E8%B7%9F%E8%B8%AA.md
探索高版本 JDK 下 JNDI 漏洞的利用方法https://tttang.com/archive/1405/
JNDI jdk高版本绕过—— Druidhttps://xz.aliyun.com/t/10656
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#11spring
SpirngBoot下结合Tomcat实现无OOB方式下的回显https://github.com/Y4tacker/JavaSec/blob/main/5.%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0/Spring/springboot-tomcat%E5%9B%9E%E6%98%BE/index.md
低版本SpringBoot-SpEL表达式注入漏洞复现分析https://y4tacker.github.io/2022/02/07/year/2022/2/%E4%BD%8E%E7%89%88%E6%9C%ACSpringBoot-SpEL%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0%E5%88%86%E6%9E%90/
SpringCloud-SnakeYAML-RCE(高版本不可用)https://y4tacker.github.io/2022/02/08/year/2022/2/SpringCloud-SnakeYAML-RCE/
Spring Boot Vulnerability Exploit Check Listhttps://github.com/LandGrey/SpringBootVulExploit
SSRF to Rce with Jolokia and Mbeanshttps://github.com/Y4tacker/JavaSec/blob/main/%E5%85%B6%E4%BB%96/SSRF%20to%20RCE%20with%20Jolokia%20and%20MBeans%20%E2%80%A2%20Think%20Love%20Share.pdf
CVE-2022-22947 SpringCloudGateWay 远程代码执行https://github.com/Y4tacker/JavaSec/blob/main/11.Spring/CVE-2022-22947%20SpringCloudGateWay%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C/index.md
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#12shiro暂时暂停学习之后继续
对网上观点的修正,欢迎指正https://github.com/Y4tacker/JavaSec/blob/main/12.Shiro/%E7%BD%91%E4%B8%8A%E7%9A%84%E8%AF%AF%E8%A7%A3/index.md
shiro<=1.5.2通用后门利用(个人小研究发现)https://github.com/Y4tacker/JavaSec/blob/main/12.Shiro/shiro1.5.2%E9%80%9A%E7%94%A8%E5%90%8E%E9%97%A8%E5%88%A9%E7%94%A8/index.md
CVE-2010-3863权限绕过(通过/./admin绕过/admin,/abc/../admin)https://github.com/Y4tacker/JavaSec/blob/main/12.Shiro/CVE-2010-3863%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87/index.md
CVE-2016-6802权限绕过(通过/abc/../y4tacker/admin绕过)https://github.com/Y4tacker/JavaSec/blob/main/12.Shiro/CVE-2016-6802%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87/index.md
Shiro550-TemplatesImpl(CC6-Shiro)https://github.com/phith0n/JavaThings/blob/master/shiroattack/src/main/java/com/govuln/shiroattack/CommonsCollectionsShiro.java
CommonsBeanutils与无 commons-collections的Shiro反序列化利用https://github.com/phith0n/JavaThings/blob/master/shiroattack/src/main/java/com/govuln/shiroattack/CommonsBeanutils1Shiro.java
另类的shiro检验key的检测方式http://www.lmxspace.com/2020/08/24/%E4%B8%80%E7%A7%8D%E5%8F%A6%E7%B1%BB%E7%9A%84shiro%E6%A3%80%E6%B5%8B%E6%96%B9%E5%BC%8F/
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#13回显相关技术学习
通杀漏洞利用回显方法-linux平台https://www.00theway.org/2020/01/17/java-god-s-eye/
linux下java反序列化通杀回显方法的低配版实现https://xz.aliyun.com/t/7307
Tomcat中一种半通用回显方法https://xz.aliyun.com/t/7348
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#其他分享
CVE-2021-2471 JDBC-XXE漏洞分析https://github.com/Y4tacker/JavaSec/blob/main/%E5%85%B6%E4%BB%96/CVE-2021-2471%20JDBC-XXE%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/CVE-2021-2471%20JDBC-XXE%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90.md
spring-messaging 远程代码执行漏洞分析https://github.com/Y4tacker/JavaSec/blob/main/%E5%85%B6%E4%BB%96/spring-messaging%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/spring-messaging%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90.md
CVE-2020-9484 Tomcat-RCE漏洞分析报告(备注:三梦师傅的文章,提升了我对Tomcat配置的了解)https://threedr3am.github.io/2020/06/12/CVE-2020-9484%20Tomcat-RCE%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90%E6%8A%A5%E5%91%8A/
Java “后反序列化漏洞” 利用思路https://paper.seebug.org/1133/
关于Servlet的线程安全问题https://y4tacker.github.io/2022/02/03/year/2022/2/Servlet%E7%9A%84%E7%BA%BF%E7%A8%8B%E5%AE%89%E5%85%A8%E9%97%AE%E9%A2%98/
BypassSMhttps://github.com/Y4tacker/JavaSec/blob/main/%E5%85%B6%E4%BB%96/BypassSM/bypasssm.md
Log4j2-RCE分析http://blog.gm7.org/%E4%B8%AA%E4%BA%BA%E7%9F%A5%E8%AF%86%E5%BA%93/02.%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1/01.Java%E5%AE%89%E5%85%A8/03.%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/06.log4j2_rce%E5%88%86%E6%9E%90.html#%E5%A4%8D%E7%8E%B0
JSP-Webshells集合https://github.com/threedr3am/JSP-Webshells
Spring Boot FatJar任意写目录漏洞导致Getshellhttps://www.cnblogs.com/wh4am1/p/14681335.html
利用TemplatesImpl执行字节码https://github.com/Y4tacker/JavaSec/blob/main/%E5%85%B6%E4%BB%96/%E5%88%A9%E7%94%A8TemplatesImpl%E6%89%A7%E8%A1%8C%E5%AD%97%E8%8A%82%E7%A0%81/%E5%88%A9%E7%94%A8TemplatesImpl%E6%89%A7%E8%A1%8C%E5%AD%97%E8%8A%82%E7%A0%81.md
为什么补丁都喜欢打在resolveClasshttps://github.com/Y4tacker/JavaSec/blob/main/4.Weblogic%E4%B8%93%E5%8C%BA/%E4%B8%BA%E4%BB%80%E4%B9%88%E8%A1%A5%E4%B8%81%E5%96%9C%E6%AC%A2%E6%89%93%E5%9C%A8resolveClass/%E4%B8%BA%E4%BB%80%E4%B9%88%E8%A1%A5%E4%B8%81%E5%96%9C%E6%AC%A2%E6%89%93%E5%9C%A8resolveClass.md
Java沙箱绕过https://www.anquanke.com/post/id/151398
JMX RMI攻击利用https://github.com/k1n9/k1n9.github.io/blob/aeeb609fe6a25d67bc2dc5f990a501368fb25409/_posts/2017-08-24-attack-jmx-rmi.md
一种普遍存在于java系统的缺陷 - Memory DoShttps://threedr3am.github.io/2021/11/18/%E4%B8%80%E7%A7%8D%E6%99%AE%E9%81%8D%E5%AD%98%E5%9C%A8%E4%BA%8Ejava%E7%B3%BB%E7%BB%9F%E7%9A%84%E7%BC%BA%E9%99%B7-Memory%20DoS/#more
如何关闭百度的Rasphttps://github.com/Y4tacker/JavaSec/blob/main/%E5%85%B6%E4%BB%96/%E5%85%B3%E9%97%AD%E7%99%BE%E5%BA%A6%E7%9A%84Rasp/index.md
漫谈 JEP 290https://paper.seebug.org/1689/#_1
构造java探测class反序列化gadgethttps://mp.weixin.qq.com/s/KncxkSIZ7HVXZ0iNAX8xPA
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#比赛反思
Codegate2022(关键词:绕过开头file协议读文件、xpath注入读系统配置)https://github.com/Y4tacker/JavaSec/blob/main/%E6%AF%94%E8%B5%9B%E5%8F%8D%E6%80%9D/2022/3/Codegate2022/index.md
SUSCTF2022(关键词:绕rasp、fastjson、xxe)https://github.com/Y4tacker/JavaSec/tree/main/%E6%AF%94%E8%B5%9B%E5%8F%8D%E6%80%9D/2022/3/SUSCTF2022
D^3CTF2022(关键词:ROME链缩短、Mybatis与Ognl)https://github.com/Y4tacker/JavaSec/blob/main/%E6%AF%94%E8%B5%9B%E5%8F%8D%E6%80%9D/2022/3/D%5E3CTF/ROME%E6%94%B9%E9%80%A0%E8%AE%A1%E5%88%92.pdf
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#环境
如何远程调试Weblogichttps://github.com/QAX-A-Team/WeblogicEnvironment
使用idea进行tomcat源码调试https://zhuanlan.zhihu.com/p/35454131
https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#todolist
Dubbo学习之后开启https://xz.aliyun.com/t/10916
无文件落地Agent型内存马植入(Java内存攻击技术漫谈-Rebyond)https://xz.aliyun.com/t/10075#toc-5
Readme https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#readme-ov-file
Apache-2.0 license https://patch-diff.githubusercontent.com/e0mlja/JavaSec-1#Apache-2.0-1-ov-file
Please reload this pagehttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1
Activityhttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/activity
0 starshttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/stargazers
0 watchinghttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/watchers
0 forkshttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/forks
Report repository https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2Fe0mlja%2FJavaSec-1&report=e0mlja+%28user%29
Releaseshttps://patch-diff.githubusercontent.com/e0mlja/JavaSec-1/releases
Packages 0https://patch-diff.githubusercontent.com/users/e0mlja/packages?repo_name=JavaSec-1
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.