foryujian / yjprotocolcut
御剑协议切换器,可以让现有的程序不需要修改就可以轻松的把传输类型切换成常见的TCP/UDP/HTTP/NTP/DNS/ICMP等
☆10Updated 3 years ago
Related projects: ⓘ
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆10Updated 2 years ago
- Cobalt Strike teamserver detection.☆16Updated 3 years ago
- Java XMLDecoder payload generator☆15Updated 3 years ago
- redteam Build platform☆19Updated 10 months ago
- AntSword 出网探测插件☆22Updated 2 years ago
- Really stupid re-implementation of invoke-wmiexec☆13Updated 2 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆15Updated 3 years ago
- woodpecker框架专用bcel库☆12Updated 3 years ago
- coremail address list export☆11Updated 3 years ago
- DPX工具界面展示☆13Updated 2 years ago
- 个人使用的一款Web CMS指纹扫描器☆25Updated 4 years ago
- ☆22Updated 3 years ago
- cobaltstrike 上线提醒☆34Updated 3 years ago
- 把jsp的cmdshell升级为冰蝎一句话☆11Updated 4 years ago
- ☆21Updated this week
- ☆24Updated this week
- Woodpecker framework Tomcat vulnerability library☆14Updated 3 years ago
- ☆12Updated this week
- CVE-2020-36184 && Jackson-databind RCE☆15Updated 3 years ago
- tp3注入总结☆17Updated 2 years ago
- OpenFire 管理后台账号密码解密☆30Updated 3 years ago
- Post-exploitation script developed using impacket☆21Updated 2 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- 微软签名缺陷利用,老技术☆18Updated 3 years ago
- 一些免杀对抗的玩意,学习仓库☆9Updated 3 years ago
- about the redis attack script, we can use it to crack the redis password and upload reverse shell to control the machine.☆10Updated 2 years ago
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Updated 3 years ago
- 渗透测试复盘总结☆15Updated 4 years ago