BeichenDream / CVE-2022-26134-Godzilla-MEMSHELLLinks
☆340Updated 3 years ago
Alternatives and similar repositories for CVE-2022-26134-Godzilla-MEMSHELL
Users that are interested in CVE-2022-26134-Godzilla-MEMSHELL are comparing it to the libraries listed below
Sorting:
- Exchange 服务器安全性的辅助测试工具☆327Updated last year
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆274Updated 2 years ago
- Java内存马注入工具☆247Updated 2 years ago
- A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX/vCenter/NSX/Horizon/vRealize Operations M…☆206Updated 3 years ago
- 修改版rebeyond☆255Updated 3 years ago
- 一款可以过国内所有杀软可以过 云查杀的shellcode loader☆147Updated 3 years ago
- 自己开的cs插件☆244Updated 2 years ago
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆279Updated last year
- Redis-Attack By Replication (通过主从复制攻击Redis)☆341Updated 2 years ago
- ☆279Updated 4 months ago
- fastjson不出网利用、c3p0☆252Updated 3 years ago
- CS免杀加载器☆173Updated 3 months ago
- A memory shell for ruoyi☆253Updated 2 years ago
- Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)☆280Updated 3 years ago
- 个人整理的一些域渗透Tricks,可能有一些错误。☆255Updated 4 years ago
- 域信息收集工具☆400Updated 2 years ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案(修改为使用ceye接收请求,添加自定义DNS服务器)☆291Updated last year
- ☆223Updated last month
- useful-code☆187Updated last year
- ☆117Updated last year
- 检测域环境内,域机器的本地管理组成员是否存在弱口令和通用口令,对域用户的权限分配以及域内委派查询☆348Updated 3 years ago
- 一款高性能 HTTP 内存代理 | 哥斯拉插件 | readteam | 红队 | 内存马 | Suo5 | Godzilla | 正向代理☆266Updated last year
- asp.net内存马检测工具☆278Updated last year
- CobaltStrike 上线自动权限维持插件☆184Updated 3 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆136Updated 2 years ago
- CVE-2022-22947 注入Godzilla内存马☆208Updated 3 years ago
- Mssql利用工具☆269Updated last year
- X系列安全工具-AV免杀框架-BypassAV☆207Updated 2 years ago
- Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践☆225Updated last year
- 获取服务器或域控登录日志☆272Updated last year