Rvn0xsy / CVE-2021-3156-plusLinks
CVE-2021-3156非交互式执行命令
☆204Updated 4 years ago
Alternatives and similar repositories for CVE-2021-3156-plus
Users that are interested in CVE-2021-3156-plus are comparing it to the libraries listed below
Sorting:
- Yet another SharpSphere☆224Updated 3 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆263Updated 2 years ago
- ☆223Updated 3 years ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆231Updated 4 years ago
- ☆142Updated 4 years ago
- 利用长亭xray高级版的回显Gadget重写的一个shiro反序列化利用工具。☆124Updated 4 years ago
- nim一键免杀☆216Updated 4 years ago
- ☆282Updated 3 years ago
- Source code of Behinder, a shell manager.冰蝎源码,反编译,当前版本3.0 Beta6,支持内存马注入☆92Updated 4 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆134Updated 2 years ago
- ☆288Updated 5 years ago
- JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅助脚本☆258Updated 3 years ago
- GUI Exploit Tool For RedTeam☆8Updated 3 years ago
- 更改后的脏牛提权代码,可以往任意文件写入任意内容,去除交互过程☆186Updated 3 years ago
- 解密weblogic AES或DES加密方法☆231Updated 4 years ago
- 个人整理的一些域渗透Tricks,可能有一些错误。☆254Updated 4 years ago
- fastjson 被动扫描、不出网payload生成☆369Updated 3 years ago
- Coremail任意文件上传漏洞POC☆157Updated 4 years ago
- 影子用户 克隆☆233Updated 3 years ago
- Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。☆89Updated 2 years ago
- fastjson bypass autotype 1.2.68 with Throwable and AutoCloseable.☆226Updated 2 years ago
- CobaltStrike 上线自动权限维持插件☆184Updated 3 years ago
- RMI 反序列化环境 一步步☆212Updated 4 years ago
- cobaltstrike插件☆180Updated 4 years ago
- JumpServer远程代码执行漏洞检测利用脚本☆200Updated 4 years ago
- 进行克隆用户、添加用户等账户防护安全检测的轻巧工具☆181Updated 3 years ago
- 提取DC日志,快速获取域用户对应IP地址☆304Updated 3 years ago
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆266Updated 3 years ago
- This project is used to collect the EXP/POC disclosed on the Internet and provide project support for Heptagram security team.☆81Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆182Updated 4 years ago