gorgiaxx / reGeorgView external linksLinks
The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
☆19Apr 9, 2018Updated 7 years ago
Alternatives and similar repositories for reGeorg
Users that are interested in reGeorg are comparing it to the libraries listed below
Sorting:
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- https://jira.atlassian.com/browse/JRASERVER-69793☆10Sep 16, 2019Updated 6 years ago
- 通过tweak注入动态库☆10Jan 15, 2025Updated last year
- Detect kerberos attacks in pcap files☆29Dec 13, 2015Updated 10 years ago
- 二进制学习笔记☆12Oct 14, 2020Updated 5 years ago
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago
- 冰蝎客户端源码☆14Apr 15, 2020Updated 5 years ago
- ☆85Dec 6, 2019Updated 6 years ago
- exploit Apache Flink Web Dashboard unauth rce on right way by python2 scripts☆91Nov 13, 2019Updated 6 years ago
- Papers☆34Oct 29, 2019Updated 6 years ago
- ☆131Jun 17, 2022Updated 3 years ago
- RCE Exploit PoC for XMLDecoder☆63Aug 1, 2013Updated 12 years ago
- CVE-2018-3245☆14Oct 25, 2018Updated 7 years ago
- ☆17Oct 17, 2018Updated 7 years ago
- a poc framework to test hosts via zoomeye sdk☆32Jun 26, 2017Updated 8 years ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- fastjson-1.2.61-RCE☆33Sep 26, 2019Updated 6 years ago
- Proof of Concept for a VSCode Python Extension Code Execution Vulnerability☆16Mar 17, 2020Updated 5 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- 分支出了些问题,无法合并到main,迁移至https://github.com/hktalent/scan4all☆17Dec 18, 2023Updated 2 years ago
- Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit☆66Jul 8, 2020Updated 5 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆141Jun 25, 2020Updated 5 years ago
- bypass JEP290 RaspHook code☆63Sep 21, 2020Updated 5 years ago
- Exploitation toolkit for RichFaces☆106Nov 3, 2023Updated 2 years ago
- A light PAM module to log user's username and password.☆15Mar 16, 2018Updated 7 years ago
- collect all the pwn problems I solved/unsolved.☆17May 9, 2024Updated last year
- ☆17Oct 25, 2018Updated 7 years ago
- 内网渗透必备工具。☆266Aug 20, 2020Updated 5 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 6 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆103Mar 10, 2020Updated 5 years ago
- 基于msf的后渗透协作平台 -- 前端部分☆20Apr 3, 2024Updated last year
- CVE-2019-2725 命令回显☆436May 8, 2023Updated 2 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆46Jun 28, 2020Updated 5 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that a…☆22Dec 25, 2017Updated 8 years ago
- CVE-2020-2551 POC to use in Internet☆22May 26, 2020Updated 5 years ago
- CVE-2019-3396 confluence SSTI RCE☆174Oct 1, 2020Updated 5 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago