YYHYlh / Apache-Dubbo-CVE-2023-23638-expLinks
Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践
☆229Updated 2 years ago
Alternatives and similar repositories for Apache-Dubbo-CVE-2023-23638-exp
Users that are interested in Apache-Dubbo-CVE-2023-23638-exp are comparing it to the libraries listed below
Sorting:
- fastjson 80 远程代码执行漏洞复现☆200Updated 3 years ago
- A memory shell for ruoyi☆259Updated 2 years ago
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆280Updated 2 years ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆277Updated 2 years ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案(修改为使用ceye接收请求,添加自定义DNS服务器)☆294Updated 2 years ago
- ☆228Updated 5 months ago
- 获取 alibaba druid 一些 sessions , sql , urls☆287Updated 7 months ago
- 基于dbcp的fastjson rce 回显☆197Updated 4 years ago
- Godzilla插件|内存马|Suo5内存代理|jmg for Godzilla☆239Updated last year
- JavaPassDump☆271Updated 3 years ago
- fastjson不出网利用、c3p0☆255Updated 4 years ago
- CVE-2022-22947 注入Godzilla内存马☆210Updated 3 years ago
- 一款让你不只在dubbo-sample、vulhub或者其他测试环境里检测和利用成功的Apache Dubbo 漏洞检测工具。☆170Updated 2 years ago
- 用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入☆285Updated 2 years ago
- JNDI注入测试工具内存马版本(增加了注入内存马模块)☆120Updated last year
- Spring Actuator端点的BurpSuite被动扫描插件。☆202Updated 3 years ago
- Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit☆112Updated 2 years ago
- 自己积累的一些Java反序列化利用链☆89Updated 2 years ago
- 冰蝎、哥斯拉 jsp webshell通信流量解密器☆145Updated 2 years ago
- rmi打内存马工具,适用于目标用不了ldap的情况☆255Updated 2 years ago
- 内存马学习☆172Updated 3 years ago
- ☆169Updated 3 years ago
- 禅道相关poc☆170Updated last year
- Abandoned - fastjson 1.2.24-1.2.80 poc & vulns env & how to check vul☆95Updated 2 years ago
- 泛微OA_V9全版本的SQL远程代码执行漏洞☆157Updated 3 years ago
- proof-of-concept for generating Java deserialization payload | Proxy MemShell☆216Updated last year
- check hikvision/ys7 api☆75Updated 2 years ago
- dubbo快速利用exp,基本上老版本覆盖100%。☆160Updated 5 months ago
- Assassin是一款精简的基于命令行的webshell管理工具,它有着多种payload发送方式和编码方式,以及精简的payload代码,使得它成为隐蔽的暗杀者,难以被很好的防御。☆120Updated 3 years ago
- 自己的JNDI 利用工具,添加一些人性化功能☆131Updated 3 years ago