rebeyond / memShell
a webshell resides in the memory of java web server
☆657Updated 6 years ago
Related projects: ⓘ
- ☆620Updated this week
- Fastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)☆1,255Updated last year
- ☆782Updated 2 years ago
- java内存对象搜索辅助工具☆777Updated last year
- Weblogic环境搭建工具☆766Updated 4 years ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆676Updated 3 years ago
- Redis 4.x/5.x RCE☆516Updated 3 years ago
- Java RCE 回显测试代码☆992Updated 3 years ago
- Collect JSP webshell of various implementation methods. 收集JSP Webshell的各种姿势☆1,349Updated 2 years ago
- 常用渗透poc收集☆294Updated 3 years ago
- A helpful Java Deserialization exploit framework.☆1,155Updated 2 months ago
- Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271/CNVD-C-2019…☆453Updated 3 years ago
- java source code static code analysis and danger function identify prog☆525Updated 5 years ago
- MySQL Fake Server use to help MySQL Client File Reading and JDBC Client Java Deserialize☆1,199Updated 2 years ago
- EHole(棱洞)-红队重点攻击系统指纹探测工具☆468Updated 3 years ago
- java memory web shell extracting tool☆401Updated 3 years ago
- ☆806Updated this week
- ☆404Updated 4 years ago
- CVE-2019-2725 命令回显☆437Updated last year
- WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell☆528Updated 4 years ago
- ☆724Updated this week
- oracle 数据库命令执行☆542Updated 3 years ago
- 一款用于JNDI注入利用的工具,大量参考/引用了Rogue JNDI项目的代码,支持直接植入内存shell,并集成了常见的bypass 高版本JDK的方式,适用于与自动化工具配合使用。☆266Updated 2 years ago
- PC客户端(C-S架构)渗透测试checklist / Client side(C-S) penetration checklist☆655Updated 3 years ago
- 通过 Redis 主从写出无损文件☆696Updated 4 years ago
- Tomcat-Ajp协议文件读取漏洞☆751Updated 4 years ago
- JavaWeb MemoryShell Inject/Scan/Killer/Protect Research & Exploring☆575Updated 3 years ago
- 增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持☆941Updated 3 months ago
- 入侵分析时发现的Webshell后门☆270Updated 5 years ago
- 搜集了市面上绝大部分weblogic解密方式,整理了7种解密weblogic的方法及响应工具。☆791Updated 10 months ago