George-boop-svg / Chinese-hackers-use-WPS-to-attack
WPS 0day.hen the wps software is running, an api interface with port 4709 will be opened. An attacker can request this interface to execute commands.
☆91Updated 7 months ago
Alternatives and similar repositories for Chinese-hackers-use-WPS-to-attack:
Users that are interested in Chinese-hackers-use-WPS-to-attack are comparing it to the libraries listed below
- Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。☆72Updated 3 months ago
- proxy/tunnel everything for red team!☆119Updated last week
- ☆33Updated last year
- Collect some security conference topics☆47Updated 9 months ago
- ☆43Updated 4 months ago
- This is a third party agent for Havoc C2 written in golang.☆57Updated last year
- A mininal go http client for security testing☆47Updated 2 months ago
- webshell manager libraries | 网站管理工具☆124Updated 2 years ago
- 内存加载执行golang elf二进制文件☆27Updated 3 years ago
- 汇编HTTP请求发送/Assembly Http Request☆46Updated 3 months ago
- 多组件客户端☆74Updated 7 months ago
- The purpose of this script is to bypass disablefund, provide some useful information, and dig the hook function of PHP extension.☆14Updated 3 years ago
- 收集云沙箱上线C2的ip,如微X、奇XX、3X0、virustX等☆123Updated last year
- portreuse reuseport 端口复用☆61Updated last year
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 2 years ago
- Multilingual backdoor☆61Updated 11 months ago
- ☆90Updated 2 years ago
- ☆83Updated 3 years ago
- All in one cybersecurity utility platform.☆23Updated 3 months ago
- 重构Beacon☆153Updated 8 months ago
- 连接eval一句话webshell,获得可交互的虚拟终端☆97Updated 2 years ago
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆157Updated 2 years ago
- 伪造cs上线流量,实现cs批量上线,欺骗防御☆35Updated 2 years ago
- impacket编程手册☆104Updated last year
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated 10 months ago
- ☆154Updated 10 months ago
- 主流供应商的一些攻击性漏洞汇总☆106Updated 3 years ago
- 根据攻防以及域信息收集经验dump快而有用 的域信息☆104Updated last year
- A decentralized basic Trojan framework that eliminates C2 mode and is implemented by P2P, the core networking technology of blockchain☆34Updated last year
- An MCP server for pentesting. Contributors wanted!☆17Updated last month