w181496 / FuckFastcgi
[Tool] Forge PHP FastCGI protocol to RCE with strict disable_functions
☆61Updated 5 years ago
Alternatives and similar repositories for FuckFastcgi:
Users that are interested in FuckFastcgi are comparing it to the libraries listed below
- ☆78Updated 4 years ago
- Rusty Joomla RCE Exploit☆69Updated 2 years ago
- To solve some readflag situation in ctfs☆34Updated 4 years ago
- django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC☆104Updated 5 years ago
- Java After-Deserialization Attack☆79Updated 4 years ago
- CTF学习交流群473831530。第四期入群题之WEB1-docker环境。☆16Updated 5 years ago
- Dockerfile for hitcon☆52Updated 6 years ago
- PaddingZip is a tool that you can craft a zip file that contains the padding characters between the file content.☆71Updated 2 years ago
- A modified reGeorg for One-line PHP Shell.☆86Updated 6 years ago
- bypass JEP290 RaspHook code☆62Updated 4 years ago
- ☆58Updated 5 years ago
- kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609☆89Updated 5 years ago
- My-CTF-Challenge☆11Updated 4 years ago
- Redis RCE 的几种方法☆90Updated 11 months ago
- PHP 扩展, 用于 PHP-FPM、FastCGI、LD_PRELOAD等模式下突破 disabled_functions☆103Updated 3 years ago
- redis ssrf gopher generater & redis ssrf to rce by master-slave-sync☆85Updated 4 years ago
- 知识星球《漏洞百出》最新 20条 Topic☆113Updated 3 years ago
- ☆44Updated 7 years ago
- Unicode fuzzer for various purposes☆47Updated 3 years ago
- Writeup and environment for XCTF2021Final-Dubbo☆44Updated 3 years ago
- RMI 反序列化环境 一步步☆210Updated 4 years ago
- ☆71Updated 2 years ago
- exploit Apache Flink Web Dashboard unauth rce on right way by python2 scripts☆90Updated 5 years ago
- My Real World CTF challenges☆114Updated 5 years ago
- WMCTF2020-WriteUp☆35Updated 4 years ago
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet☆50Updated 3 years ago
- ☆111Updated 5 years ago
- GitLab 11.4.7 SSRF配合redis远程执行代码☆123Updated 6 years ago
- 基于 puppeteer-core + chromium 的 XSS 机器人☆26Updated 5 years ago
- some struts tag , attributes which out of the range will call SetDynamicAttribute() function, it will cause ONGL expression execute☆69Updated 4 years ago