Y4er / CVE-2021-35215
SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE
☆47Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2021-35215
- ☆14Updated 3 years ago
- CobaltStrike Extentions☆39Updated 3 years ago
- dump lsass tool☆39Updated 2 years ago
- resource-based constrained delegation RBCD☆43Updated 2 years ago
- about the redis attack script, we can use it to crack the redis password and upload reverse shell to control the machine.☆10Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- CVE-2023-21742 Poc☆13Updated last year
- Cs-Sleep-Mask-Fiber☆16Updated 2 months ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆45Updated 3 years ago
- redteam Build platform☆19Updated last year
- 蓝凌OA漏洞利用工具/前台无条件RCE/文件写入☆20Updated 3 years ago
- 结合反射调用、动态编译、BCEL、defineClass0,ScriptEngine、Expression等技术的一款免杀JSP Webshell生成工具☆18Updated 2 years ago
- CVE-2020-36184 && Jackson-databind RCE☆15Updated 3 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- Exchange ProxyRelay POC☆36Updated 2 years ago
- 攻击Java Web应用-[Java Web安全]☆15Updated 3 years ago
- Grafana Arbitrary File Reading Vulnerability☆27Updated 2 years ago
- ☆26Updated 4 years ago
- Citrix ADC从权限绕过到RCE☆46Updated 4 years ago
- ☆23Updated 2 years ago
- cobalt strike 自用脚本☆27Updated 4 years ago
- Stop Windows Defender programmatically☆15Updated 2 years ago
- ☆45Updated 4 months ago
- Atlassian Questions Hardcoded Password (CVE-2022-26138)☆31Updated 2 years ago
- Really stupid re-implementation of invoke-wmiexec☆13Updated 2 years ago
- Use current thread token to execute command☆15Updated 3 years ago
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆15Updated 5 years ago
- OpenFire 管理后台账号密码解密☆30Updated 3 years ago