BeichenDream / Kcon2021Code
☆269Updated 3 years ago
Alternatives and similar repositories for Kcon2021Code:
Users that are interested in Kcon2021Code are comparing it to the libraries listed below
- 通过正则搜索、批量反编译特定Jar包中的class名称☆308Updated 3 years ago
- Java表达式语句生成器☆188Updated last year
- ☆283Updated 3 years ago
- 一款通过污点追踪发现Jsp webshell的工具(A tool to find Jsp Webshell through stain tracking)☆177Updated 3 years ago
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆266Updated 3 years ago
- FilterBased/ServletBased in memory shell for Tomcat and some other middlewares☆367Updated 4 years ago
- JavaPassDump☆251Updated 3 years ago
- Java Js Engine Payloads All in one☆271Updated last year
- ☆319Updated 9 months ago
- Java web路由内存分析工具☆431Updated 5 months ago
- Java内存马注入工具☆245Updated 2 years ago
- JetBrains系列产品.idea钓鱼反制红队☆331Updated 3 years ago
- fastjson 80 远程代码执行漏洞复现☆192Updated 2 years ago
- 不那么一样的 Java Agent 内存马☆263Updated last year
- fastjson不出网利用、c3p0☆252Updated 3 years ago
- Auto Code Audit Framework for Java☆96Updated 3 years ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆231Updated 4 years ago
- ☆210Updated 8 months ago
- ☆184Updated 7 months ago
- 基于 jdwp-shellifier 的进阶JDWP漏洞利用脚本(动态执行Java/Js代码并获得回显)☆277Updated 4 months ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆275Updated 2 years ago
- 收集内存马打入方式☆495Updated 2 years ago
- fastjson 被动扫描、不出网payload生成☆367Updated 3 years ago
- ☆107Updated 3 years ago
- WIP: Demo for Attacking Apereo CAS☆91Updated 4 years ago
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆279Updated last year
- 利用链、漏洞检测工具☆367Updated 9 months ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆257Updated 2 years ago
- Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践☆223Updated last year
- Tomcat 冰蝎内存马。☆211Updated 4 years ago