B0y1n4o4's repositories
LuckyMoney
Wechat And DingDing LuckyMoney
chasingpolarbears
files for write-up
ClassHound
利用任意文件下载漏洞循环下载反编译 Class 文件获得网站 Java 源代码
CppHttpDemo
light weight C++ httpserver and httpclient based on mongoose
ctftool
Interactive CTF Exploration Tool
CVE-2018-13379
CVE-2018-13379
CVE-2018-13382
CVE-2018-13382
CVE-2019-0708-EXP-Windows
CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell
CVE-2019-11510
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
CVE-2019-11539
Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect
cve-2020-0688
cve-2020-0688
CVE-2020-0689
Exploit and detect tools for CVE-2020-0688
Dumpert
LSASS memory dumper using direct system calls and API unhooking.
fastjson-remote-code-execute-poc
fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java
GadgetToJScript
(Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS based scripts.
HackerTools
使用MFC编写的病毒技术合集
m0chan.github.io
m0chan.github.io
muddyc3
Leaked Muddyc3 C2 source.
PcWeChatHooK
云课堂《2019 PC微信 探秘》示例代码
pentesttools
redteam
POPFuckProxy
POP3 MITM example
public-src
非涉密源码
RedisModules-ExecuteCommand
Tools, utilities and scripts to help you write redis modules!
rootit.ko
linux内核提权后门模块demo
sRDI
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
SysWhispers
AV/EDR evasion via direct system calls.
声明1:本源码是本人利用业余时间所写,《免费》 仅供逆向编程爱好者学习使用!本源码禁止用于商业非法用途! 声明2:本源码无任何恶意代码!但可能存在些许BUG 因此所造成的损失等概与本人无关 声明3:使用编译本源码即默认同意上述声明+
WeChatRobot
PC版微信机器人
WeChatSport
微信运动刷步[卓易健康]