wupco / PHP_INCLUDE_TO_SHELL_CHAR_DICTLinks
☆347Updated 2 years ago
Alternatives and similar repositories for PHP_INCLUDE_TO_SHELL_CHAR_DICT
Users that are interested in PHP_INCLUDE_TO_SHELL_CHAR_DICT are comparing it to the libraries listed below
Sorting:
- dotnet 反序列化学习笔记☆509Updated 2 years ago
- Automatically converts Python source code to Pickle opcode☆155Updated 10 months ago
- A plugin for CTFd which allow your users to deploy a standalone instance for challenges.☆240Updated last year
- Collections of CTF-WEB-challs mainly for review purpose.☆30Updated 2 years ago
- 关于我在CTF中的所有东西☆410Updated last month
- 80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background serv…☆849Updated last year
- 自动化的 Python 沙箱逃逸 payload bypass 框架 / Automated Python Sandbox Escape Payload Bypass Framework☆98Updated 10 months ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆747Updated 4 years ago
- CTF中任意文件读取的fuzz列表 (Arbitrary file read fuzz list in CTF)☆274Updated 3 years ago
- A tiny project for generating SnakeYAML deserialization payloads☆621Updated last month
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆323Updated last year
- javaDeserializeLabs☆70Updated 2 years ago
- A rouge mysql server supports reading files from most mysql libraries of multiple programming languages.☆747Updated 2 years ago
- ☆154Updated last year
- CodeQL extractor for java, which don't need to compile java source☆347Updated 2 years ago
- ZKar is a Java serialization protocol analysis tool implement in Go.☆629Updated 9 months ago
- Linux Eelvation(持续更新)☆405Updated 3 years ago
- ☆20Updated 4 years ago
- Unicode fuzzer for various purposes☆49Updated 3 years ago
- docker container escape check || Docker 容器逃逸检测☆642Updated 3 years ago
- JDBC Connection URL Attack☆433Updated 4 years ago
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆497Updated last year
- 记录学习codeql的过程☆388Updated 2 years ago
- exec BashCommand with only ! # $ ' ( ) < \ { } just 10 charset used in Bypass or CTF☆252Updated last year
- 闭源系统半自动漏洞挖掘工具,针对 jar/war/zip 进行静态代码分析,输出从source到sink的可达路径。LLM将验证路径可达性,并根据上下文给出该路径可信分数☆481Updated 5 months ago
- ☆519Updated 3 years ago
- CTFd plugin that allows your users to have exclusive environments for each challenge, with dynamic flags.☆160Updated 10 months ago
- Index of CTFHub Base Images☆83Updated 5 years ago
- ysoserial修改版,着重修改ysoserial.payloads.util.Gadgets.createTemplatesImpl使其可以通过引入自定义class的形式来执行命令、内存马、反序列化回显。☆741Updated last year
- CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2…☆280Updated 2 years ago