Pinned Repositories
ByPassBehinder4J
冰蝎Java WebShell自动化免杀生成
CVE-2017-15944-POC
CVE-2017-15944 Palo Alto Networks firewalls remote root code execution POC
xxnbyy's Repositories
xxnbyy/ByPassBehinder4J
冰蝎Java WebShell自动化免杀生成
xxnbyy/API-Security-Checklist
Checklist of the most important security countermeasures when designing, testing, and releasing your API
xxnbyy/ArbitraryDirectoryDeletion
From directory deletion to SYSTEM shell
xxnbyy/chaos-public-program-list
Source for bug bounty programs available on Chaos
xxnbyy/CN_Nessus_Plugins_Interface
nessus插件中文查询接口
xxnbyy/CVE-2019-7192_QNAP_Exploit
QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)
xxnbyy/CVE-2020-1066-EXP
CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统
xxnbyy/CVE-2020-11890
CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE
xxnbyy/CVE-2020-12800
POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload
xxnbyy/CVE-2020-1337-exploit
CVE-2020-1337 Windows Print Spooler Privilege Escalation
xxnbyy/cve-2020-1337-poc
poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)
xxnbyy/CVE-2020-3956
PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)
xxnbyy/CVE-2021-1675
Impacket implementation of CVE-2021-1675
xxnbyy/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC
xxnbyy/CVE-2021-26084
xxnbyy/cve-2021-43858
xxnbyy/fastjsonScan
fastjson漏洞burp插件,检测fastjson<1.2.68基于dnslog,fastjson<=1.2.24和1.2.33<=fatjson<=1.2.47的不出网检测和TomcatEcho,SpringEcho回显方案。
xxnbyy/flannel
flannel is a network fabric for containers, designed for Kubernetes
xxnbyy/JNDIExploit
A malicious LDAP server for JNDI injection attacks
xxnbyy/MYExploit
OAExploit一款基于产品的一键扫描工具。
xxnbyy/PrintDemon
PrintDemon is a PoC for a series of issues in the Windows Print Spooler service, as well as potetial misuses of the functionality.
xxnbyy/PrintNightmare
xxnbyy/redteam-research
Collection of PoC and offensive techniques used by the BlackArrow Red Team
xxnbyy/ShiroExploit
Shiro550/Shiro721 一键化利用工具
xxnbyy/SweetPotato
SweetPotato修改版,用于webshell下执行命令 感谢@zcgonvh和@RcoIl两位师傅的耐心指导
xxnbyy/SweetPotato-1
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
xxnbyy/SylantStrike
Simple EDR implementation to demonstrate bypass
xxnbyy/TaskScheduler-Bypass
TaskScheduler-Bypass
xxnbyy/ThinkphpGUI
Thinkphp(GUI)漏洞利用工具,支持各版本TP漏洞检测,命令执行,getshell。
xxnbyy/windows_protocol