H4ckForJob / kingkongLinks
解密哥斯拉webshell管理工具流量
☆73Updated 4 years ago
Alternatives and similar repositories for kingkong
Users that are interested in kingkong are comparing it to the libraries listed below
Sorting:
- Godzilla java Decode,哥斯拉jsp(内存马)流量解密☆111Updated 3 years ago
- 一款针对于IDE的反制蜜罐 IDE-honeypot☆107Updated 2 years ago
- Godzilla traffic decoder☆46Updated 3 years ago
- geacon:简单适配了一个profile配置文件,可直接拿来修改使用,用于cs上线linux.☆161Updated 2 years ago
- CTFCrackTools 's BurpSuite Plugin - Decode and Encode☆84Updated 3 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆134Updated 2 years ago
- 利用RPC服务,批量探测内网Windows出网情况☆126Updated 3 years ago
- xxl-job未授权命令执行☆109Updated 3 years ago
- 使用WindowsAPI写的一些渗透小工具☆99Updated 3 years ago
- weblogic历史漏洞利用工具☆91Updated 2 years ago
- A heapdump leaks Shiro key causing RCE vulnerability environment.☆54Updated last year
- 泛微OA_V9全版本的SQL远程代码执行漏洞☆157Updated 3 years ago
- cve-2020-1472 复现利用及其exp☆111Updated 4 years ago
- Attack cobalt strike server’s FCS by DoW☆72Updated last year
- ☆69Updated 4 years ago
- Assassin是一款精简的基于命令行的webshell管理工具,它有着多种payload发送方式和编码方式,以及精简的payload代码,使得它成为隐蔽的暗杀者,难以被很好的防御。☆116Updated 3 years ago
- 利用字符集编码绕过waf的burpsuite插件☆121Updated 4 years ago
- ☆81Updated 3 years ago
- Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947☆76Updated 2 years ago
- 基于ysoserial扩展命令执行结果回显,生成冰蝎内存马☆89Updated last year
- A malicious LDAP server for JNDI injection attacks☆52Updated 2 years ago
- 一个Spring4Shell 被动式检测的Burp插件☆93Updated 3 years ago
- 伪造webshell钓鱼反制蚁剑☆50Updated 3 years ago
- ☆117Updated last year
- 用于windows反弹shell的yaml-payload☆71Updated 3 years ago
- SpringFramework 远程代码执行漏洞CVE-2022-22965☆75Updated 3 years ago
- 应对渗透中极限环境下命令回显 & 文件落地☆132Updated 2 years ago
- SMTP Netcat , test SMTP protocol☆105Updated 3 years ago
- CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation☆97Updated 3 years ago
- exchange-ssrf-rce☆78Updated 4 years ago