BeichenDream / Kcon2021Code
☆270Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Kcon2021Code
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆264Updated 2 years ago
- Java表达式语句生成器☆179Updated last year
- ☆282Updated 2 years ago
- 通过正则搜索、批量反编译特定Jar包中的class名称☆307Updated 2 years ago
- ☆299Updated 3 months ago
- Java内存马注入工具☆243Updated last year
- FilterBased/ServletBased in memory shell for Tomcat and some other middlewares☆356Updated 4 years ago
- Compatible with xray and nuclei poc framework☆189Updated last year
- 一款通过污点追踪发现Jsp webshell的工具(A tool to find Jsp Webshell through stain tracking)☆175Updated 2 years ago
- 不那么一样的 Java Agent 内存马☆255Updated 11 months ago
- Java Js Engine Payloads All in one☆269Updated last year
- ☆197Updated 2 months ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆272Updated last year
- fastjson不出网利用、c3p0☆246Updated 3 years ago
- ☆181Updated last month
- 解决web及移动端H5数据加密Burp调试问题☆182Updated 2 years ago
- Java web路由内存分析工具☆424Updated last week
- JetBrains系列产品.idea钓鱼反制红队☆301Updated 2 years ago
- JavaPassDump☆217Updated 2 years ago
- fastjson 被动扫描、不出网payload生成☆369Updated 3 years ago
- fastjson 80 远程代码执行漏洞复现☆182Updated 2 years ago
- 收集内存马打入方式☆497Updated 2 years ago
- 一款高性能 HTTP 内存代理 | 哥斯拉插件 | readteam | 红队 | 内存马 | Suo5 | Godzilla | 正向代理☆249Updated last year
- 基于 jdwp-shellifier 的进阶JDWP漏洞利用脚本(动态执行Java/Js代码并获得回显)☆232Updated last week
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆232Updated 3 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆129Updated 2 years ago