AlphabugX / godzilla_decode
Godzilla java Decode,哥斯拉jsp(内存马)流量解密
☆105Updated 3 years ago
Alternatives and similar repositories for godzilla_decode:
Users that are interested in godzilla_decode are comparing it to the libraries listed below
- 一款探测fastjson漏洞的BurpSuite插件☆61Updated 2 years ago
- 基于ysoserial扩展命令执行结果回显,生成冰蝎内存马☆87Updated last year
- xxl-job未授权命令执行☆106Updated 3 years ago
- 支持自动化的切换请求方式、自动化的请求重试、以完整的扫描Springboot路径☆3Updated 2 years ago
- 泛微OA_V9全版本的SQL远程代码执行漏洞☆157Updated 2 years ago
- weblogic历史漏洞利 用工具☆91Updated 2 years ago
- Kunlun-M 的GUI程序☆51Updated 2 years ago
- Assassin是一款精简的基于命令行的webshell管理工具,它有着多种payload发送方式和编码方式,以及精简的payload代码,使得它成为隐蔽的暗杀者,难以被很好的防御。☆116Updated 2 years ago
- ☆81Updated 3 years ago
- 利用字符集编码绕过waf的burpsuite插件☆117Updated 3 years ago
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆79Updated last year
- ☆68Updated 3 years ago
- Druid 密文解密工具☆130Updated 4 years ago
- 一个Spring4Shell 被动式检测的Burp插件☆93Updated 2 years ago
- AutoScan 有多个目标时,多线程调用xray+rad进行自动扫描☆88Updated 2 years ago
- XxlJob<=2.1.2配置不当情况下反序列化RCE☆91Updated 4 years ago
- 提供一个Golang 的bypass AV 思路。☆77Updated last year
- seeyon致远OA全漏洞检测与利用☆56Updated 2 years ago
- springboot跨线程注入内存马☆116Updated 2 years ago
- 将Goby的json格式Poc转为xray的yaml格式Poc☆131Updated 2 years ago
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆103Updated last year
- Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947☆76Updated 2 years ago
- 自己积累的一些Java反序列化利用链☆87Updated 2 years ago
- FofaMap云查询版是基于C/S架构打造的Fofa数据采集器,仅需配置好一个服务端,即可实现多个客户端同时在线查询,其客户端支持FofaMap国庆版全部功能。☆38Updated 2 years ago
- Java漏洞分析汇合☆142Updated 3 years ago
- ☆44Updated 2 years ago
- 基于dbcp的fastjson rce 回显☆191Updated 3 years ago
- fastjson 80 远程代码执行漏洞复现☆191Updated 2 years ago
- SpringFramework 远程代码执行漏洞CVE-2022-22965☆75Updated 2 years ago
- Godzilla traffic decoder☆44Updated 3 years ago