ysoserial.net v1.34 releases: Deserialization payload generator for a variety of .NET formatters
A proof-of-concept tool for generating payloads that exploit unsafe .NET object deserialization.
ysoserial.net is a collection of utilities and property-oriented programming “gadget chains” discovered in common .NET libraries that can, under the right conditions, exploit .NET applications performing unsafe deserialization of objects. The main driver program takes a user-specified command and wraps it in the user-specified gadget chain, then serializes these objects to stdout. When an application with the required gadgets on the classpath unsafely deserializes this data, the chain will automatically be invoked and cause the command to be executed on the application host.
It should be noted that the vulnerability lies in the application performing unsafe deserialization and NOT in having gadgets on the classpath.
This project is inspired by Chris Frohoff’s ysoserial project
This software has been created purely for the purposes of academic research and for the development of effective defensive techniques and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.
This software is a personal project and not related to any companies, including Project owner and contributors employers.
Readme update + ActivitySurrogateSelectorFromFile fixed
Credit section updated in Readme
ActivitySurrogateSelectorFromFile needed the E.dll file to work which was missing from the Release version (wrong config fixed) so ActivitySurrogateSelectorGenerator.cs has been updated to make ActivitySurrogateSelectorFromFile works as usual even with a missing E.dll
Copyright (c) 2017-2019 Alvaro Muñoz