feihong-cs / memShellLinks
FilterBased/ServletBased in memory shell for Tomcat and some other middlewares
☆375Updated 5 years ago
Alternatives and similar repositories for memShell
Users that are interested in memShell are comparing it to the libraries listed below
Sorting:
- JDBC Connection URL Attack☆433Updated 4 years ago
- Redis-Attack By Replication (通过主从复制攻击Redis)☆345Updated 2 years ago
- Struts2漏洞实例源码☆208Updated 4 years ago
- 收集内存马打入方式☆501Updated 3 years ago
- 通过正则搜索、批量反编译特定Jar包中的class名称☆317Updated 3 years ago
- ☆338Updated last month
- 集权设施扫描器☆438Updated last year
- ☆519Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆358Updated 3 years ago
- 一个高度可定制化的JNDI和Java反序列化利用工具☆471Updated 2 years ago
- (周瑜)Java - SpringBoot 持久化 WebShell(不仅仅是SpringBoot,适合任何符合JavaEE规范的服务)☆616Updated 3 years ago
- Shiro-550 不依赖CC链利用工具☆453Updated last year
- ☆341Updated 3 years ago
- 利用链、漏洞检测工具☆374Updated last year
- 拿来即用的Tomcat7/8/9/10版本Listener/Filter/Servlet内存马,支持注入CMD内存马和冰蝎内存马☆509Updated 3 years ago
- asp.net内存马检测工具☆282Updated 2 years ago
- 一款可以在不出网的环境下进行反向代理及cs上线的工具☆491Updated 2 years ago
- java memory web shell extracting tool☆476Updated 4 years ago
- 给woodpecker框架量身定制的ysoserial☆596Updated 3 years ago
- JavaWeb MemoryShell Inject/Scan/Killer/Protect Research & Exploring☆640Updated 4 years ago
- Java内存马注入工具☆251Updated 2 years ago
- WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell☆536Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆182Updated 4 years ago
- ☆300Updated 8 months ago
- ☆289Updated 3 years ago
- A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins / extract secret_key …☆266Updated 3 weeks ago
- 通过 Redis 主从写出无损文件☆721Updated 5 years ago
- 域信息收集工具☆410Updated 3 years ago
- JNDI在java高版本的利用工具,FUZZ利用链☆590Updated 3 years ago
- AWS云平台 AccessKey 泄漏利用工具☆391Updated 2 years ago