foryujian / yjprotocolcut
御剑协议切换器,可以让现有的程序不需要修改就可以轻松的把传输类型切换成常见的TCP/UDP/HTTP/NTP/DNS/ICMP等
☆10Updated 4 years ago
Alternatives and similar repositories for yjprotocolcut:
Users that are interested in yjprotocolcut are comparing it to the libraries listed below
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆10Updated 3 years ago
- AntSword 出网探测插件☆22Updated 2 years ago
- Cobalt Strike teamserver detection.☆16Updated 3 years ago
- 个人使用的一款Web CMS指纹扫描器☆25Updated 4 years ago
- CVE-2020-36184 && Jackson-databind RCE☆14Updated 4 years ago
- redteam Build platform☆19Updated last year
- woodpecker框架专用bcel库☆12Updated 3 years ago
- Java XMLDecoder payload generator☆15Updated 3 years ago
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Updated 4 years ago
- CVE-2020-9548:FasterXML/jackson-databind 远程代码执行漏洞☆23Updated 5 years ago
- Really stupid re-implementation of invoke-wmiexec☆13Updated 2 years ago
- tp3注入总结☆17Updated 3 years ago
- coremail address list export☆11Updated 3 years ago
- 攻击Java Web应用-[Java Web安全]☆14Updated 4 years ago
- DPX工具界面展示☆13Updated 3 years ago
- 微软签名缺陷利用,老技术☆18Updated 3 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Updated 3 years ago
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆15Updated 6 years ago
- Woodpecker framework Tomcat vulnerability library☆14Updated 3 years ago
- 把jsp的cmdshell升级为冰蝎一句话☆11Updated 5 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- 个人使用的一款脚本提权扫描器☆19Updated 4 years ago
- Nexus Repository Manager3 - 远程执行代码漏洞回显payload☆13Updated 4 years ago
- VMware vCenter 未授权RCE(CVE-2021-21972)☆27Updated 4 years ago
- ☆14Updated 4 years ago
- 渗透测试复盘总结☆15Updated 4 years ago
- ☆20Updated 4 years ago
- SharpRDP改编版☆20Updated 4 years ago
- a script combine masscan and nmap☆9Updated 5 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Updated 2 years ago