BeichenDream / CVE-2022-26134-Godzilla-MEMSHELL
☆333Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2022-26134-Godzilla-MEMSHELL
- Exchange 服务器安全性的辅助测试工具☆314Updated last year
- A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX/vCenter/NSX/Horizon/vRealize Operations M…☆204Updated 2 years ago
- Redis-Attack By Replication (通过主从复制攻击Redis)☆318Updated last year
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆272Updated last year
- 一款可以过国内所有杀软可以过云查杀的shellcode loader☆144Updated 2 years ago
- 域信息收集工具☆384Updated 2 years ago
- ☆255Updated last year
- 获取服务器或域控登录日志☆270Updated last year
- A memory shell for ruoyi☆233Updated last year
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆275Updated 11 months ago
- asp.net内存马检测工具☆259Updated last year
- Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)☆271Updated 2 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆129Updated 2 years ago
- 自己开的cs插件☆242Updated last year
- ☆197Updated 2 months ago
- Java内存马注入工具☆243Updated last year
- 一款OutLook信息收集工具☆231Updated last year
- ☆217Updated 2 years ago
- Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践☆218Updated last year
- fastjson不出网利用、c3p0☆246Updated 3 years ago
- CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch.☆314Updated 2 years ago
- Mssql利用工具☆261Updated last year
- 命令执行不回显但DNS协议出网的命令回显场景解决方案(修改为使用ceye接收请求,添加自定义DNS服务器)☆287Updated last year
- 使用 Godzilla 一键注入 Suo5 内存马☆375Updated 6 months ago
- CVE-2022-22947 注入Godzilla内存马☆203Updated 2 years ago
- Java Js Engine Payloads All in one☆269Updated last year
- 个人整理的一些域渗透Tricks,可能有一些错误。☆246Updated 3 years ago