CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/external/source/exploits/CVE-2015-8103/Deserialize.java
Views: 11779
1
package ysoserial;
2
3
import java.io.File;
4
import java.io.FileInputStream;
5
import java.io.IOException;
6
import java.io.InputStream;
7
8
import ysoserial.payloads.util.Serializables;
9
10
/*
11
* for testing payloads across process boundaries
12
*/
13
public class Deserialize {
14
public static void main(final String[] args) throws ClassNotFoundException, IOException {
15
final InputStream in = args.length == 0 ? System.in : new FileInputStream(new File(args[0]));
16
Serializables.deserialize(in);
17
}
18
}
19
20