0671 / RedisModules-ExecuteCommand-for-WindowsLinks
可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。
☆263Updated 2 years ago
Alternatives and similar repositories for RedisModules-ExecuteCommand-for-Windows
Users that are interested in RedisModules-ExecuteCommand-for-Windows are comparing it to the libraries listed below
Sorting:
- ☆231Updated 3 years ago
- ☆288Updated 3 years ago
- woodpecker框架weblogic信息探测插件☆184Updated 3 years ago
- fastjson不出网利用、c3p0☆253Updated 4 years ago
- 进行克隆用户、添加用户等账户防护安全检测的轻巧工具☆183Updated 4 years ago
- springboot跨线程注入内存马☆122Updated 3 years ago
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆270Updated 3 years ago
- 个人整理的一些域渗透Tricks,可能有一些错误。☆255Updated 4 years ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆231Updated 4 years ago
- ☆116Updated 2 years ago
- cve-2020-1472 复现利用及其exp☆112Updated 5 years ago
- JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅助脚本☆259Updated 3 years ago
- CobaltStrike 上线自动权限维持插件☆185Updated 4 years ago
- This is a crawler password tool☆100Updated 4 years ago
- 利用RPC服务,批量探测内网Windows出网情况☆126Updated 3 years ago
- fastjson 80 远程代码执行漏洞复现☆197Updated 3 years ago
- AntSword(蚁剑)全参数流量XOR和Base64加伪装WebShell☆165Updated 4 years ago
- Spring Cloud SnakeYAML 反序列化一键注入cmdshell和reGeorg☆135Updated 5 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆137Updated 3 years ago
- 基于dbcp的fastjson rce 回显☆197Updated 4 years ago
- CVE-2022-22947 注入Godzilla内存马☆210Updated 3 years ago
- ☆122Updated 2 years ago
- 利用字符集编码绕过waf的burpsuite插件☆124Updated 4 years ago
- 下架☆141Updated 3 years ago
- X系列安全工具-AV免杀框架-BypassAV☆207Updated 3 years ago
- 提取DC日志,快速获取域用户对应IP地址☆306Updated 3 years ago
- geacon:简单适配了一个profile配置文件,可直接拿来修改使用,用于cs上线linux.☆162Updated 3 years ago
- JavaPassDump☆266Updated 3 years ago
- CS免杀加载器☆178Updated 6 months ago
- 获取Exchange信息的小工具☆227Updated 2 years ago