pentest-deserialization-xxe

Community

Exploit deserialization and XXE flaws.

Authoryhy0
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill helps security professionals identify and exploit deserialization vulnerabilities and XML External Entity (XXE) flaws, crucial for comprehensive penetration testing.

Core Features & Use Cases

  • Deserialization Attack Surface: Identifies common entry points for deserialization attacks across Java, Python, .NET, and PHP.
  • XXE Attack Surface: Pinpoints XML processing points vulnerable to XXE, including file uploads and SOAP endpoints.
  • Exploitation Techniques: Provides payloads and methods for exploiting these vulnerabilities, including RCE via gadget chains and data exfiltration via blind XXE.
  • Use Case: When testing a web application that accepts file uploads or processes XML configurations, this Skill guides you through identifying and exploiting potential deserialization or XXE vulnerabilities.

Quick Start

Use the pentest-deserialization-xxe skill to identify and exploit deserialization vulnerabilities in the target application.

Dependency Matrix

Required Modules

None required

Components

scriptsreferences

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: pentest-deserialization-xxe
Download link: https://github.com/yhy0/ghsa-skill-builder/archive/main.zip#pentest-deserialization-xxe

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.