Rvn0xsy / CVE-2021-3156-plus
CVE-2021-3156非交互式执行命令
☆201Updated 4 years ago
Alternatives and similar repositories for CVE-2021-3156-plus:
Users that are interested in CVE-2021-3156-plus are comparing it to the libraries listed below
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆257Updated 2 years ago
- 利用长亭xray高级版的回显Gadget重写的一个shiro反序列化利用工具。☆122Updated 4 years ago
- CS免杀加载器☆143Updated 4 years ago
- Yet another SharpSphere☆221Updated 3 years ago
- ☆283Updated 2 years ago
- ☆219Updated 3 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆132Updated 2 years ago
- 个人整理的一些域渗透Tricks,可能有一些错误。☆251Updated 3 years ago
- 解密哥斯拉webshell管理工具流量☆65Updated 3 years ago
- 影子用户 克隆☆228Updated 3 years ago
- GUI Exploit Tool For RedTeam☆7Updated 3 years ago
- 解密weblogic AES或DES加密方法☆229Updated 4 years ago
- A webshell manager for php🍩☆84Updated last year
- 中国蚁剑JSP一句话Payload☆120Updated 4 years ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆230Updated 4 years ago
- JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅助脚本☆257Updated 3 years ago
- nim一键免杀☆214Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆181Updated 3 years ago
- CobaltStrike 上线自动权限维持插件☆183Updated 3 years ago
- RMI 反序列化环境 一步步☆210Updated 4 years ago
- Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。☆89Updated 2 years ago
- Source code of Behinder, a shell manager.冰蝎源码,反编译,当前版本3.0 Beta6,支持内存马注入☆90Updated 3 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in redis with password.用于生成附带密码认证的gopher内容,用于SSRF等利用。☆114Updated 5 years ago
- woodpecker框架weblogic信息探测插件☆179Updated 3 years ago
- AntSword(蚁剑)全参数流量XOR和Base64加伪装WebShell☆162Updated 3 years ago
- Web端POC-EXP 整理☆98Updated 3 years ago
- Coremail任意文件上传漏洞POC☆157Updated 3 years ago
- 利用NTLM Hash读取Exchange邮件☆421Updated 2 months ago
- Flask 内存马☆311Updated 4 years ago
- ☆96Updated last year