whwlsfb / cve-2022-22947-godzilla-memshellLinks
CVE-2022-22947 注入Godzilla内存马
☆209Updated 3 years ago
Alternatives and similar repositories for cve-2022-22947-godzilla-memshell
Users that are interested in cve-2022-22947-godzilla-memshell are comparing it to the libraries listed below
Sorting:
- Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践☆227Updated 2 years ago
- fastjson 80 远程代码执行漏洞复现☆197Updated 3 years ago
- 改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能☆280Updated last year
- rmi打内存马工具,适用于目标用不了ldap的情况☆256Updated 2 years ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案(修改为使用ceye接收请求,添加自定义DNS服务器)☆293Updated 2 years ago
- 一款让你不只在dubbo-sample、vulhub或者其他测试环境里检测和利用成功的Apache Dubbo 漏洞检测工具。☆169Updated 2 years ago
- 自己积累的一些Java反序列化利用链☆89Updated 2 years ago
- springboot跨线程注入内存马☆122Updated 3 years ago
- 内存加载shellcode绕过waf☆206Updated 3 years ago
- 禅道相关poc☆168Updated last year
- 利用阿里云oss对象存储,来转发http流量实现(cs)Cobalt Strike、msf 上线等 这之间利用阿里云的相关域名进行通信。☆167Updated 2 years ago
- 泛微OA_V9全版本的SQL远程代码执行漏洞☆157Updated 3 years ago
- A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX/vCenter/NSX/Horizon/vRealize Operations M…☆205Updated 3 years ago
- 命令执行不回显但DNS协议出网的命令回显场景解决方案☆276Updated 2 years ago
- JavaPassDump☆265Updated 3 years ago
- ☆122Updated 2 years ago
- Exchange 服务器安全性的辅助测试工具☆331Updated 2 years ago
- A memory shell for ruoyi☆255Updated 2 years ago
- 一款OutLook信息收集工具☆239Updated 2 years ago
- Assassin是一款精简的基于命令行的webshell管理工具,它有着多种payload发送方式和编码方式,以及精简的payload代码,使得它成为隐蔽的暗杀者,难以被很好的防御。☆120Updated 3 years ago
- 域内密码喷射工具☆131Updated 3 years ago
- 用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入☆285Updated last year
- 基于dbcp的fastjson rce 回显☆197Updated 4 years ago
- fastjson不出网利用、c3p0☆253Updated 4 years ago
- 获取服务器或域控登录日志☆274Updated 2 years ago
- 一款可以过国内所有杀软可以过云查杀的shellcode loader☆147Updated 3 years ago
- ☆227Updated 3 months ago
- 提供一个Golang 的bypass AV 思路。☆78Updated 2 years ago
- Godzilla插件|内存马|Suo5内存代理|jmg for Godzilla☆230Updated last year
- 利用字符集编码绕过waf的burpsuite插件☆123Updated 4 years ago