George-boop-svg / Chinese-hackers-use-WPS-to-attackLinks
WPS 0day.hen the wps software is running, an api interface with port 4709 will be opened. An attacker can request this interface to execute commands.
☆94Updated 10 months ago
Alternatives and similar repositories for Chinese-hackers-use-WPS-to-attack
Users that are interested in Chinese-hackers-use-WPS-to-attack are comparing it to the libraries listed below
Sorting:
- Collect some security conference topics☆49Updated 11 months ago
- 使用 rust 实现 CobaltStrike 的 beacon || Using Rust to implement CobaltStrike's Beacon☆160Updated 3 months ago
- 解决先知文件大小限制的问题☆16Updated 10 months ago
- Chrome-RCE-Poc☆85Updated 10 months ago
- 收集云沙箱上线C2的ip,如微X、奇XX、3X0、virustX等☆125Updated last year
- ☆154Updated last year
- impacket编程手册☆105Updated last year
- PolicyKit CVE-2021-3560 Exploit (Authentication Agent)☆116Updated 3 years ago
- JDK CVE-2023-21939☆96Updated last year
- 一种通过进程注入实现强制关闭部分杀软进程的方法(以360安全卫士和360杀毒为例)☆133Updated last year
- 容器安全漏洞的分析与复现☆158Updated last year
- ☆45Updated 6 months ago
- 内存加载执行golang elf二进制文件☆27Updated 3 years ago
- 重构Beacon☆159Updated 10 months ago
- NOPEN Tool 又名“morerats” 莫雷斯特,是方程式工具包里的工具。☆46Updated 3 years ago
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆159Updated 2 years ago
- ☆33Updated last year
- 无Windows API的新型恶意程序:自缺陷程序利用堆栈溢出的隐匿稳定攻击技术研究,A new type of malicious program without Windows API☆85Updated 3 months ago
- All in one cybersecurity utility platform.☆24Updated 5 months ago
- webshell manager libraries | 网站管理工具☆128Updated 2 years ago
- Path traversal in Ollama with rogue registry server☆46Updated last year
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 2 years ago
- This is a third party agent for Havoc C2 written in golang.☆58Updated last year
- 汇编HTTP请求发送/Assembly Http Request☆48Updated 5 months ago
- JDBC Attack Tricks☆142Updated last year
- ☆35Updated 2 years ago
- This is a Cheatsheet for CTF Challenges categorized by different Privilege Escalation Methods☆24Updated 5 years ago
- ☆65Updated 11 months ago
- 伪造cs上线流量,实现cs批量上线,欺骗防御☆36Updated 2 years ago
- 多组件客户端☆74Updated last month