A-D-Team / attackRmi
☆217Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for attackRmi
- fastjson不出网利用、c3p0☆246Updated 3 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆257Updated last year
- woodpecker框架weblogic信息探测插件☆179Updated 2 years ago
- fastjson 被动扫描、不出网payload生成☆369Updated 3 years ago
- fastjson 80 远程代码执行漏洞复现☆182Updated 2 years ago
- ☆195Updated 2 months ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆272Updated last year
- 基于dbcp的fastjson rce 回显☆189Updated 3 years ago
- 个人整理的一些域渗透Tricks,可能有一些错误。☆246Updated 3 years ago
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆275Updated 11 months ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆232Updated 3 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆129Updated 2 years ago
- GUI Exploit Tool For RedTeam☆7Updated 3 years ago
- A memory shell for ruoyi☆233Updated last year
- ☆282Updated 2 years ago
- 泛微OA_V9全版本的SQL远程代码执行漏洞☆156Updated 2 years ago
- Exchange 服务器安全性的辅助测试工具☆313Updated last year
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆264Updated 2 years ago
- springboot跨线程注入内存马☆114Updated 2 years ago
- 一款通过污点追踪发现Jsp webshell的工具(A tool to find Jsp Webshell through stain tracking)☆175Updated 2 years ago
- CVE-2022-22947 注入Godzilla内存马☆203Updated 2 years ago
- AntSword(蚁剑)全参数流量XOR和Base64加伪装WebShell☆162Updated 3 years ago
- Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践☆218Updated last year
- 下架☆141Updated 2 years ago
- JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅助脚本☆256Updated 3 years ago
- CobaltStrike 上线自动权限维持插件☆182Updated 3 years ago
- BCEL encode/decode manager for fastjson payloads☆143Updated 2 years ago