l3yx / jdwp-codeifierLinks
基于 jdwp-shellifier 的进阶JDWP漏洞利用脚本(动态执行Java/Js代码并获得回显)
☆319Updated last year
Alternatives and similar repositories for jdwp-codeifier
Users that are interested in jdwp-codeifier are comparing it to the libraries listed below
Sorting:
- 一款支持自定义的 Java 回显载荷生成工具|A customizable Java echo payload generation tool.☆459Updated last year
- Java Js Engine Payloads All in one☆289Updated 2 years ago
- Java web路由内存分析工具☆437Updated 8 months ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案(修改为使用ceye接收请求,添加自定义DNS服务器)☆292Updated 2 years ago
- ☆341Updated 3 months ago
- ☆234Updated 7 months ago
- Java应用的一些配置文件字典,来源于公开的字典与平时收集☆321Updated 2 years ago
- A memory shell for ruoyi☆266Updated 2 years ago
- fastjson 80 远程代码执行漏洞复现☆199Updated 3 years ago
- Java表达式语句生成器☆194Updated 2 years ago
- Some ReadObject Sink With JDBC☆243Updated last year
- shiro加fastjson环境☆146Updated 3 years ago
- 无需文件落地Agent内存马生成器☆247Updated last year
- JavaPassDump☆272Updated 4 years ago
- java-web 自动化鉴权绕过☆375Updated 10 months ago
- ☆249Updated last year
- proof-of-concept for generating Java deserialization payload | Proxy MemShell☆221Updated last year
- 用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入☆287Updated 2 years ago
- Java内存马注入工具☆252Updated 2 years ago
- JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 / CVE-2023-42820 / RCE 2021☆269Updated 7 months ago
- 通过jsp脚本扫描并查杀Tomcat内存马,当前支持Servlet-api、Tomcat-Value、Timer、Websocket 、Upgrade 、ExecutorShell内存马的查杀逻辑。☆66Updated 2 years ago
- 不那么一样的 Java Agent 内存马☆289Updated 2 years ago
- Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践☆230Updated 2 years ago
- Godzilla插件|内存马|Suo5内存代理|jmg for Godzilla☆243Updated last year
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆277Updated 3 years ago
- 获取 alibaba druid 一些 sessions , sql , urls☆291Updated 9 months ago
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆279Updated 2 years ago
- 使用 Godzilla 一键注入 Suo5 内存马☆440Updated last year
- 通过正则搜索、批量反编译特定Jar包中的class名称☆320Updated 4 years ago
- 一款高性能 HTTP 内存代理 | 哥斯拉插件 | readteam | 红队 | 内存马 | Suo5 | Godzilla | 正向代理☆287Updated 2 years ago