-
Notifications
You must be signed in to change notification settings - Fork 124
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Example PoC of ACE to link on README.md #12
Comments
Interesting, didn't know you could bypass the security manager like that. Check out the latest commit. |
If you find another bypass, let me know! |
Your latest commit will actually break your other executions in certain cases (notably, the ones for Stringer) as some decryptor methods actually make use of some of the classes you prohibited with that commit. Examples:
Furthermore, the presence of the VM can still be found with something such as |
Oops, didn't notice that. You can't really hide the VM instance, but that's not that important IMO. Gotta find a workaround for that. |
It is gonna be pretty hard to block bypasses using reflection, as |
Java doesn't allow me to redefine |
Saw your warning @ https://github.com/GraxCode/threadtear#warning and thought it would be cool if people could see what an example of a successful arbitrary code execution would look like on threadtear as well as how the deobfuscator's instances are exposed to the program.
The PoC below specifically is targeted against Allatori's transformer; however, it can easily be adapted to fool threadreaper into executing it in any of the other transformers which utilize the VM.
The text was updated successfully, but these errors were encountered: