BeichenDream / CVE-2022-26134-Godzilla-MEMSHELLLinks
☆341Updated 3 years ago
Alternatives and similar repositories for CVE-2022-26134-Godzilla-MEMSHELL
Users that are interested in CVE-2022-26134-Godzilla-MEMSHELL are comparing it to the libraries listed below
Sorting:
- Exchange 服务器安全性的辅助测 试工具☆331Updated 2 years ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆277Updated 2 years ago
- 自己开的cs插件☆247Updated 2 years ago
- Java内存马注入工具☆250Updated 2 years ago
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆280Updated 2 years ago
- A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX/vCenter/NSX/Horizon/vRealize Operations M…☆209Updated 3 years ago
- Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)☆288Updated 3 years ago
- 域信息收集工具☆410Updated 3 years ago
- Redis-Attack By Replication (通过主从复制攻击Redis)☆349Updated 3 years ago
- 一款可以过国内所有杀软可以过云查杀的shellcode loader☆151Updated 3 years ago
- asp.net内存马检测工具☆281Updated 2 years ago
- ☆300Updated 9 months ago
- CobaltStrike 上线自动权限维持插件☆185Updated 4 years ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案(修改为使用ceye接收请求,添加自定义DNS服务器)☆294Updated 2 years ago
- A memory shell for ruoyi☆262Updated 2 years ago
- 个人整理的一些域渗透Tricks,可能有一些错误。☆256Updated 4 years ago
- ☆228Updated 6 months ago
- CS免杀加载器☆179Updated 8 months ago
- fastjson不出网利用、c3p0☆255Updated 4 years ago
- ☆291Updated 3 years ago
- ☆216Updated 3 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆137Updated 3 years ago
- 检测域环境内,域机器的本地管理组成员是否存在弱口令和通用口令,对域用户的权限分配以及域内委派查询☆352Updated 4 years ago
- ☆338Updated last month
- X系列安全工具-AV免杀框架-BypassAV☆207Updated 3 years ago
- Mssql利用工具☆274Updated 2 years ago
- ☆231Updated 3 years ago
- Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践☆229Updated 2 years ago
- Modifying JuicyPotato to support load shellcode and webshell☆195Updated 4 years ago
- JavaPassDump☆271Updated 3 years ago