Pinned Repositories
go
The Go programming language
Auto_proxy
利用IP地址池进行自动切换Http代理,防止IP封禁。
CNVD_2022_24937
PHPMyWind(CNVD_2022_24937) 任意文件上传
CreateUser
绕过360,火绒添加用户
Unauthorized
集成二十六种未授权访问[Active MQ ,Atlassian Crowd ,CouchDB ,Docker ,Dubbo ,Druid ,Elasticsearch ,FTP ,Hadoop ,JBoss ,Jenkins ,Jupyter Notebook ,Kibana ,Kubernetes Api Server ,LDAP ,MongoDB ,Memcached ,NFS ,Rsync ,Redis ,RabbitMQ ,Solr ,Spring Boot Actuator ,Weblogic ,ZooKeeper ,Zabbix]
RuanLang0777's Repositories
RuanLang0777/CreateUser
绕过360,火绒添加用户
RuanLang0777/Unauthorized
集成二十六种未授权访问[Active MQ ,Atlassian Crowd ,CouchDB ,Docker ,Dubbo ,Druid ,Elasticsearch ,FTP ,Hadoop ,JBoss ,Jenkins ,Jupyter Notebook ,Kibana ,Kubernetes Api Server ,LDAP ,MongoDB ,Memcached ,NFS ,Rsync ,Redis ,RabbitMQ ,Solr ,Spring Boot Actuator ,Weblogic ,ZooKeeper ,Zabbix]
RuanLang0777/CNVD_2022_24937
PHPMyWind(CNVD_2022_24937) 任意文件上传
RuanLang0777/CVE-2024-53677-S2-067
A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.
RuanLang0777/goby-POC3
基于Pocsuite3、goby编写的漏洞poc&exp存档