XTeam-Wing / Hunting-Active-Directory
个人整理的一些域渗透Tricks,可能有一些错误。
☆246Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Hunting-Active-Directory
- Redis-Attack By Replication (通过主从复制攻击Redis)☆318Updated last year
- fastjson不出网利用、c3p0☆246Updated 3 years ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆232Updated 3 years ago
- ☆217Updated 2 years ago
- fastjson 被动扫描、不出网payload生成☆369Updated 3 years ago
- 域渗透脑图中文翻译版☆276Updated 3 years ago
- AntSword(蚁剑)全参数流量XOR和Base64加伪装WebShell☆162Updated 3 years ago
- JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅助脚本☆256Updated 3 years ago
- X系列安全工具-AV免杀框架-BypassAV☆203Updated 2 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆257Updated last year
- 一款可以过国内所有杀软可以过云查杀的shellcode loader☆144Updated 2 years ago
- 一个可以伪装上线Cobaltstrike的脚本☆129Updated 2 years ago
- nim一键免杀☆213Updated 3 years ago
- 适用于weblogic和Tomcat的无文件的内存马(memshell)☆264Updated 2 years ago
- 下架☆141Updated 2 years ago
- Shiro-550 不依赖CC链利用工具☆447Updated 5 months ago
- ☆197Updated 2 months ago
- cobaltstrike插件☆180Updated 3 years ago
- Exchange 服务器安全性的辅助测试工具☆314Updated last year
- 基于dbcp的fastjson rce 回显☆189Updated 3 years ago
- 2020年~2021年 网站CMS、中间件、框架系统漏洞集合☆99Updated 3 years ago
- woodpecker框架weblogic信息探测插件☆179Updated 2 years ago
- 远程代码执行S2-062 CVE-2021-31805验证POC☆131Updated 2 years ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆272Updated last year
- CVE-2022-22947 注入Godzilla内存马☆203Updated 2 years ago
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆275Updated 11 months ago
- 内存马学习☆168Updated 2 years ago
- Apache Shiro 反序列化漏洞检测与利用工具,一键注入内存马☆139Updated 3 years ago