AlphabugX / godzilla_decodeLinks
Godzilla java Decode,哥斯拉jsp(内存马)流量解密
☆111Updated 3 years ago
Alternatives and similar repositories for godzilla_decode
Users that are interested in godzilla_decode are comparing it to the libraries listed below
Sorting:
- xxl-job未授权命令执行☆108Updated 3 years ago
- Godzilla traffic decoder☆46Updated 3 years ago
- 解密哥斯拉webshell管理工具流量☆73Updated 4 years ago
- 一款针对于IDE的反制蜜罐 IDE-honeypot☆107Updated 2 years ago
- 自己积累的一些Java反序列化利用链☆89Updated 2 years ago
- ☆81Updated 3 years ago
- 泛微OA_V9全版本的SQL远程代码执行漏洞☆157Updated 3 years ago
- Druid 密文解密工具☆131Updated 4 years ago
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆80Updated last year
- 利用字符集编码绕过waf的burpsuite插件☆121Updated 4 years ago
- 一款让你不只在dubbo-sample、vulhub或者其他测试环境里检测和利用成功的Apache Dubbo 漏洞检测工具。☆168Updated last year
- 支持自动化的切换请求方式、自动化的请求重试、以完整的扫描Springboot路径☆3Updated 3 years ago
- 基于ysoserial扩展命令执行结果回显,生成冰蝎内存马☆89Updated last year
- weblogic历史漏洞利用工具☆91Updated 2 years ago
- 一个Spring4Shell 被动式检测的Burp插件☆93Updated 3 years ago
- Assassin是一款精简的基于命令行的webshell管理工具,它有着多种payload发送方式和编码方式,以及精简的payload代码,使得它成为隐蔽的暗杀者,难以被很好的防御。☆116Updated 3 years ago
- 一款探测fastjson漏洞的BurpSuite插件☆61Updated 3 years ago
- CTFCrackTools 's BurpSuite Plugin - Decode and Encode☆84Updated 3 years ago
- 将Goby的json格式Poc转为xray的yaml格式Poc☆132Updated 2 years ago
- 《FanZhi-攻击与反制的艺术》☆65Updated last year
- Java命令行文件监控小工具(代码审计)☆102Updated 3 years ago
- fastjson 80 远程代码执行漏洞复现☆194Updated 2 years ago
- AutoScan 有多个目标时,多线程调用xray+rad进行自动扫描☆88Updated 2 years ago
- ☆117Updated last year
- MemShell List☆81Updated last year
- Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947☆76Updated 2 years ago
- springboot跨线程注入内存马☆119Updated 3 years ago
- A heapdump leaks Shiro key causing RCE vulnerability environment.☆54Updated last year
- Java漏洞分析汇合☆142Updated 3 years ago
- ☆69Updated 4 years ago