xzajyjs / CVE-2022-39197-POCLinks
CVE-2022-39197(CobaltStrike XSS <=4.7) POC
☆47Updated 2 years ago
Alternatives and similar repositories for CVE-2022-39197-POC
Users that are interested in CVE-2022-39197-POC are comparing it to the libraries listed below
Sorting:
- ☆92Updated 2 years ago
- Tools developed during the personal learning process☆23Updated 3 years ago
- 窃取当前用户的ssh,sudo密码☆69Updated 2 years ago
- NoPacScan is a CVE-2021-42287/CVE-2021-42278 Scanner,it scan for more domain controllers than other script☆89Updated 3 years ago
- webshell manager libraries | 网站管理工具☆128Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆70Updated 2 years ago
- 🗽 基于Socket RAW,利用 NTLMSSP 探测 Windows远程主机信息☆50Updated 2 years ago
- 连接eval一句话webshell,获得可交互的虚 拟终端☆97Updated 2 years ago
- detect gitlab detail version☆54Updated 10 months ago
- 密码收集☆58Updated 3 years ago
- YApi boolean-based injection exploit.☆58Updated 2 years ago
- cve-2022-23131 exp☆93Updated 3 years ago
- 后台插件getshell☆50Updated 3 years ago
- 根据攻防以及域信息收集经验dump快而有用的域信息☆104Updated last year
- 去除了流量特征的UDP协议跨平台机器管理工具☆37Updated 4 years ago
- 绕过杀软添加用户☆46Updated 4 years ago
- CVE-2023-36899漏洞的复现环境和工具,针对ASP.NET框架中的无cookie会话身份验证绕过。☆30Updated last year
- ☆47Updated 3 years ago
- ☆100Updated 2 years ago
- ☆94Updated 2 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated 2 years ago
- CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入☆71Updated 3 years ago
- 内存马持久化☆59Updated 3 years ago
- Cobalt Strike random C2 Profile 修改版(适配腾讯云函数,亚马逊云函数和CrossC2自定义protocol)☆89Updated 2 years ago
- windows 添加管理员--Rust版本☆44Updated 3 years ago
- Powershell 免杀脚本☆50Updated 2 years ago
- portreuse reuseport 端口复用☆62Updated last year
- 个人翻译/总结渗透测试思维导图☆28Updated 3 years ago
- hyscan HengGe Team☆68Updated 3 years ago
- CVE-2022-33980 Apache Commons Configuration 远程命令执行漏洞☆41Updated 3 years ago