XTeam-Wing / Hunting-Active-DirectoryLinks
个人整理的一些域渗透Tricks,可能有一些错误。
☆259Updated 4 years ago
Alternatives and similar repositories for Hunting-Active-Directory
Users that are interested in Hunting-Active-Directory are comparing it to the libraries listed below
Sorting:
- ☆231Updated 4 years ago
- 域渗透脑图中文翻译版☆280Updated 4 years ago
- fastjson不出网利用、c3p0☆255Updated 4 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆264Updated 3 years ago
- 基于反向代理的水坑部署工具☆261Updated 4 years ago
- fastjson 被动扫描、不出网payload生成☆367Updated 4 years ago
- JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅助脚本☆258Updated 4 years ago
- X系列安全工具-AV免杀框架-BypassAV☆207Updated 3 years ago
- 远程代码执行S2-062 CVE-2021-31805验证POC☆131Updated 2 months ago
- A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins / extract secret_key …☆268Updated 3 months ago
- woodpecker框架weblogic信息探测插件☆185Updated 3 years ago
- CobaltStrike 上线自动权限维持插件☆185Updated 4 years ago
- 下架☆141Updated 4 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆137Updated 3 years ago
- BCEL encode/decode manager for fastjson payloads☆152Updated 3 years ago
- ☆294Updated 3 years ago
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆279Updated 2 years ago
- ☆342Updated 3 years ago
- 内存马学习☆172Updated 3 years ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆232Updated 5 years ago
- Redis-Attack By Replication (通过主从复制攻击Redis)☆354Updated 3 years ago
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆269Updated 3 years ago
- nim一键免杀☆215Updated 4 years ago
- Apache Shiro 反序列化漏洞检测与利用工具,一键注入内存马☆138Updated 5 years ago
- 一款可以过国内所有杀软可以过云查杀的shellcode loader☆150Updated 3 years ago
- CS免杀加载器☆181Updated 10 months ago
- CVE-2022-22947☆222Updated 3 years ago
- CVE-2022-22947 注入Godzilla内存马☆210Updated 3 years ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆277Updated 3 years ago
- 敌后侦察☆235Updated 3 years ago