BeichenDream / CVE-2022-26134-Godzilla-MEMSHELL
☆337Updated 2 years ago
Alternatives and similar repositories for CVE-2022-26134-Godzilla-MEMSHELL
Users that are interested in CVE-2022-26134-Godzilla-MEMSHELL are comparing it to the libraries listed below
Sorting:
- Exchange 服务器安全性的辅助测试工具☆324Updated last year
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆275Updated 2 years ago
- fastjson不出网利用、c3p0☆252Updated 3 years ago
- A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX/vCenter/NSX/Horizon/vRealize Operations M…☆204Updated 3 years ago
- 自己开的cs插件☆244Updated 2 years ago
- 个人整理的一些域渗透Tricks,可能有一些错误。☆253Updated 4 years ago
- Java内存马注入工具☆245Updated 2 years ago
- Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)☆277Updated 3 years ago
- 一款可以过国内所有杀软可以过云查杀的shellcode loader☆147Updated 3 years ago
- 修改版rebeyond☆254Updated 3 years ago
- Redis-Attack By Replication (通过主从复制攻击Redis)☆333Updated 2 years ago
- CS免杀加载 器☆161Updated last month
- 获取服务器或域控登录日志☆271Updated last year
- 域信息收集工具☆395Updated 2 years ago
- ☆219Updated 3 years ago
- Modifying JuicyPotato to support load shellcode and webshell☆190Updated 3 years ago
- 一款OutLook信息收集工具☆237Updated last year
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆279Updated last year
- ☆211Updated 8 months ago
- CVE-2022-22947 注入Godzilla内存马☆208Updated 3 years ago
- asp.net内存马检测工具☆271Updated last year
- 命令执行不回显但DNS协议出网的命令回显场景解决方案(修改为使用ceye接收请求,添加自定义DNS服务器)☆291Updated last year
- fastjson 被动扫描、不出网payload生成☆368Updated 3 years ago
- ☆320Updated 9 months ago
- CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch.☆316Updated 2 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆257Updated 2 years ago
- 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化☆333Updated 3 years ago
- Mssql利用工具☆267Updated last year
- A memory shell for ruoyi☆246Updated 2 years ago
- 泛微OA_V9全版本的SQL远程代码执行漏洞☆157Updated 3 years ago