Rvn0xsy / CVE-2021-3156-plus
CVE-2021-3156非交互式执行命令
☆199Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2021-3156-plus
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆257Updated 2 years ago
- 利用长亭xray高级版的回显Gadget重写的一个shiro反序列化利用工具。☆123Updated 4 years ago
- ☆217Updated 2 years ago
- nim一键免杀☆213Updated 3 years ago
- Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。☆90Updated 2 years ago
- GUI Exploit Tool For RedTeam☆7Updated 3 years ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆232Updated 3 years ago
- ☆290Updated 4 years ago
- Yet another SharpSphere☆222Updated 3 years ago
- 更改后的脏牛提权代码,可以往任意文件写入任意内容,去除交互过程☆184Updated 2 years ago
- ☆282Updated 2 years ago
- 解密weblogic AES或DES加密方法☆225Updated 3 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆239Updated 4 years ago
- Coremail任意文件上传漏洞POC☆156Updated 3 years ago
- 鱼儿在cs上线后自动收杆|Automatically stop fishing in javascript after the fish is hooked☆134Updated 4 years ago
- reGeorg的特殊版本,适用于老版本weblogic。☆153Updated 4 years ago
- ☆145Updated 3 years ago
- c# 读取登录过本机的登录失败或登录成功(4624,4625)的所有计算机信息,在内网渗透中快速定位运维管理人员。☆206Updated 5 years ago
- cobaltstrike插件☆179Updated 3 years ago
- AntSword(蚁剑)全参数流量XOR和Base64加伪装WebShell☆162Updated 3 years ago
- CS免杀加载器☆142Updated 3 years ago