Aggregator
SB恶作剧样本分析
SB恶作剧样本分析
SB恶作剧样本分析
APEX: Azure Post Exploitation Framework
APEX – Azure Post Exploitation Framework An attempt to ease up post ex tasks once we have access to some sort of credentials to an Azure related account. To be honest it is nothing...
The post APEX: Azure Post Exploitation Framework appeared first on Penetration Testing Tools.
Solr服务器上的“花式”远程代码执行(RCE)
Solr服务器上的“花式”远程代码执行(RCE)
Solr服务器上的“花式”远程代码执行(RCE)
Solr服务器上的“花式”远程代码执行(RCE)
Solr服务器上的“花式”远程代码执行(RCE)
Solr服务器上的“花式”远程代码执行(RCE)
.NET 2025年3月份红队武器库和资源汇总
.NET 安全攻防知识交流社区
.NET 内网实战:通过 slui.exe 绕过 UAC 实现提权
arya: produces pseudo-malicious files meant to trigger YARA rules
Arya – The Reverse YARA Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it as a reverse YARA because it does exactly the opposite...
The post arya: produces pseudo-malicious files meant to trigger YARA rules appeared first on Penetration Testing Tools.
pphack: The Most Advanced Client-Side Prototype Pollution Scanner
pphack is a CLI tool for scanning websites for client-side prototype pollution vulnerabilities. Feature Fast (concurrent workers) Default payload covers a lot of cases Payload and Javascript customization Proxy-friendly Support output in a file...
The post pphack: The Most Advanced Client-Side Prototype Pollution Scanner appeared first on Penetration Testing Tools.