# JavaSec **Repository Path**: li-bai112/JavaSec ## Basic Information - **Project Name**: JavaSec - **Description**: 11111111111111111111111111111111111111111 - **Primary Language**: Java - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2023-10-14 - **Last Updated**: 2024-08-13 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # JavaSec ![JavaSec](https://socialify.git.ci/bewhale/JavaSec/image?description=1&font=Source%20Code%20Pro&forks=1&issues=1&language=1&name=1&owner=1&pattern=Solid&stargazers=1&theme=Light) 本项目使用JAVA "1.8.0_112" 基于Spring boot + layuimini 进行开发实现。 # 数据库配置 在`application.yml`里面修改MySQL数据库用户名密码 默认为 root/123456 然后新建数据库 `javasec` 导入 javasec.sql 文件 # 项目运行 下载运行[jar包](https://github.com/bewhale/JavaSec/releases/download/v1.0/javasec-0.0.1-SNAPSHOT.jar)即可 ``` java -jar javasec-0.0.1-SNAPSHOT.jar ``` # 预览 ![](https://raw.githubusercontent.com/bewhale/JavaSec/master/images/01.png) ![](https://raw.githubusercontent.com/bewhale/JavaSec/master/images/02.png) ![](https://raw.githubusercontent.com/bewhale/JavaSec/master/images/03.png) # 参考文章 https://github.com/j3ers3/Hello-Java-Sec https://github.com/lalajun/RMIDeserialize https://github.com/LandGrey/SpringBootVulExploit http://www.jrasp.com/case/ https://javasec.org/