Inspired by Chris Frohoff's work on Java Deserialization Vulnerability and Ian Haken's 2018 Blackhat talk, aims to automate the discovery of gadget chains that can be armed as a payload to attack an application.
Usage: Recommended to download the scanner from SerialSeeker.zip under release. Unzip the file to run the executable SerialSeeker.jar in the terminal. Target application must be in jar or war file format to be scanned. The executable is interactive simply provide the relevant information asked to perform a scan.