B0y1n4o4's repositories

LuckyMoney

Wechat And DingDing LuckyMoney

Language:JavaLicense:MITStargazers:13Issues:2Issues:2

chasingpolarbears

files for write-up

Stargazers:0Issues:0Issues:0

ClassHound

利用任意文件下载漏洞循环下载反编译 Class 文件获得网站 Java 源代码

Language:PythonLicense:MITStargazers:0Issues:1Issues:0

CppHttpDemo

light weight C++ httpserver and httpclient based on mongoose

Stargazers:0Issues:0Issues:0

ctftool

Interactive CTF Exploration Tool

Language:CLicense:Apache-2.0Stargazers:0Issues:0Issues:0

CVE-2018-13379

CVE-2018-13379

Language:PythonStargazers:0Issues:0Issues:0

CVE-2018-13382

CVE-2018-13382

Language:PythonStargazers:0Issues:0Issues:0

CVE-2019-0708-EXP-Windows

CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell

License:AFL-3.0Stargazers:0Issues:0Issues:0

CVE-2019-11510

Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)

Language:ShellStargazers:0Issues:0Issues:0

CVE-2019-11539

Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect

License:GPL-3.0Stargazers:0Issues:0Issues:0

cve-2020-0688

cve-2020-0688

Language:PythonStargazers:0Issues:1Issues:0

CVE-2020-0689

Exploit and detect tools for CVE-2020-0688

Language:C#Stargazers:0Issues:1Issues:0

Dumpert

LSASS memory dumper using direct system calls and API unhooking.

Language:CStargazers:0Issues:0Issues:0

fastjson-remote-code-execute-poc

fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java

Language:JavaStargazers:0Issues:0Issues:0

GadgetToJScript

(Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS based scripts.

License:GPL-3.0Stargazers:0Issues:0Issues:0

HackerTools

使用MFC编写的病毒技术合集

Stargazers:0Issues:0Issues:0

m0chan.github.io

m0chan.github.io

License:CC0-1.0Stargazers:0Issues:0Issues:0

muddyc3

Leaked Muddyc3 C2 source.

Language:PythonStargazers:0Issues:0Issues:0

PcWeChatHooK

云课堂《2019 PC微信 探秘》示例代码

Stargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

POPFuckProxy

POP3 MITM example

Stargazers:0Issues:0Issues:0

public-src

非涉密源码

Stargazers:0Issues:0Issues:0

RedisModules-ExecuteCommand

Tools, utilities and scripts to help you write redis modules!

License:MITStargazers:0Issues:0Issues:0

rootit.ko

linux内核提权后门模块demo

Language:CStargazers:0Issues:0Issues:0
Language:C#Stargazers:0Issues:0Issues:0

sRDI

Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode

Language:PowerShellLicense:NOASSERTIONStargazers:0Issues:0Issues:0

SysWhispers

AV/EDR evasion via direct system calls.

License:Apache-2.0Stargazers:0Issues:0Issues:0

WeChat

声明1:本源码是本人利用业余时间所写,《免费》 仅供逆向编程爱好者学习使用!本源码禁止用于商业非法用途! 声明2:本源码无任何恶意代码!但可能存在些许BUG 因此所造成的损失等概与本人无关 声明3:使用编译本源码即默认同意上述声明+

Stargazers:0Issues:0Issues:0

WeChatRobot

PC版微信机器人

Stargazers:0Issues:0Issues:0

WeChatSport

微信运动刷步[卓易健康]

Stargazers:0Issues:0Issues:0