H4ckForJob / kingkongLinks
解密哥斯拉webshell管理工具流量
☆75Updated 4 years ago
Alternatives and similar repositories for kingkong
Users that are interested in kingkong are comparing it to the libraries listed below
Sorting:
- Godzilla java Decode,哥斯拉jsp(内存马)流量解密☆111Updated 3 years ago
- 一款针对于IDE的反制蜜罐 IDE-honeypot☆107Updated 3 years ago
- Godzilla traffic decoder☆47Updated 4 years ago
- 利用字符集编码绕过waf的burpsuite插件☆123Updated 4 years ago
- ☆70Updated 4 years ago
- weblogic历史漏洞利用工具☆91Updated 3 years ago
- This is a crawler password tool☆100Updated 4 years ago
- Kunlun-M 的GUI程序☆52Updated 2 years ago
- CTFCrackTools 's BurpSuite Plugin - Decode and Encode☆84Updated 3 years ago
- xxl-job未授权命令执行☆110Updated 3 years ago
- SpringFramework 远程代码执行漏洞CVE-2022-22965☆74Updated 3 years ago
- 在原有yso基础上实现依赖分离,内存马注入等功能。A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆68Updated 4 years ago
- 泛微OA_V9全版本的SQL远程代码执行漏洞☆157Updated 3 years ago
- Expolit Lists. 相关集合💥💥💥 ;) 用友NC反序列化/ CTF/ Java Deserialization/Shiro Vulns/ CNVD or CVE Vulns/ Log4j2/ Hikvision-decrypter...✨✨✨☆68Updated last year
- Assassin是一款精简的基于命令行的webshell管理工具,它有着多种payload发送方式和编码方式,以及精简的payload代码,使得它成为隐蔽的暗杀者,难以被很好的防御。☆120Updated 3 years ago
- AntSword(蚁剑)全参数流量XOR和Base64加伪装WebShell☆165Updated 4 years ago
- woodpecker框架weblogic信息探测插件☆184Updated 3 years ago
- cve-2020-1472 复现利用及其exp☆112Updated 5 years ago
- ☆82Updated 3 years ago
- 基于ysoserial扩展命令执行结果回显,生成冰蝎内存马☆91Updated 2 years ago
- Attack cobalt strike server’s FCS by DoW☆73Updated 2 years ago
- ☆82Updated 4 years ago
- ☆108Updated 3 years ago
- 伪造webshell钓鱼反制蚁剑☆51Updated 3 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆137Updated 3 years ago
- springboot跨线程注入内存马☆122Updated 3 years ago
- 利用RPC服务,批量探测内网Windows出网情况☆126Updated 3 years ago
- 阿里云AccessKey泄漏利用工具☆153Updated 4 years ago
- TongdaOA 11.7 ~11.8 通达OA,任意用户登录+后台getshell☆86Updated 4 years ago
- Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947☆77Updated 2 years ago