BeichenDream / Kcon2021CodeLinks
☆273Updated 3 years ago
Alternatives and similar repositories for Kcon2021Code
Users that are interested in Kcon2021Code are comparing it to the libraries listed below
Sorting:
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆267Updated 3 years ago
- 通过正则搜索、批量反编译特定Jar包中的class名称☆311Updated 3 years ago
- 一款通过污点追踪发现Jsp webshell的工具(A tool to find Jsp Webshell through stain tracking)☆178Updated 3 years ago
- ☆284Updated 3 years ago
- Java表达式语句生成器☆192Updated last year
- 个人使用CodeQL编写的一些规则☆176Updated 3 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆263Updated 2 years ago
- ☆227Updated 3 years ago
- ☆108Updated 3 years ago
- ☆96Updated last year
- FilterBased/ServletBased in memory shell for Tomcat and some other middlewares☆371Updated 4 years ago
- JetBrains系列产品.idea钓鱼反制红队☆331Updated 3 years ago
- JavaPassDump☆260Updated 3 years ago
- ☆143Updated 2 years ago
- 不那么一样的 Java Agent 内存马☆283Updated last year
- BCEL encode/decode manager for fastjson payloads☆149Updated 3 years ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆231Updated 4 years ago
- Auto Code Audit Framework for Java☆96Updated 3 years ago
- java decompile audit tools☆228Updated 2 years ago
- fastjson 80 远程代码执行漏洞复现☆196Updated 2 years ago
- Java Js Engine Payloads All in one☆275Updated last year
- fastjson不出网利用、c3p0☆252Updated 4 years ago
- 注入JVM进程 动态获取目标进程连接的数据库☆337Updated 3 years ago
- 当死去的记忆突然开始攻击我,我终于想起了我还写过一款十分十分垃圾的 rasp 靶场。☆78Updated 3 years ago
- ☆192Updated 10 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆182Updated 4 years ago
- 哥斯拉源码-v3.03-godzilla☆142Updated 3 years ago
- Java web路由内存分析工具☆434Updated 2 months ago
- Tomcat 冰蝎内存马。☆214Updated 4 years ago
- A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins / extract secret_key …☆263Updated last month