草泥马之家
Windows与.Net.....
首页
文档
工具
留言本
.Net
CVE-2020-17144漏洞分析与武器化
2020年12月10日 / 作者:zcgonvh / 分类:.Net / 评论:1 / 浏览:19390
一个强行为Exchange2010延命两个月的漏洞 /手动狗头
Tags:
.Net
Exchange
Deserialize
工具
.Net
CVE-2020-0688的武器化与.net反序列化漏洞那些事
2020年03月01日 / 作者:zcgonvh / 分类:.Net / 评论:5 / 浏览:16582
作为漏洞曾经的持有者,讲一些比较细节的部分。
Tags:
.Net
Exchange
Deserialize
工具
‹‹
1
››
搜索
最近发表
DCOM Potato
Advanced Windows TaskScheduler Playbook - Part.3 from RPC to lateral movement
Advanced Windows Task Scheduler Playbook - Part.2 from COM to UAC bypass and get SYSTEM dirtectly
Advanced Windows Task Scheduler Playbook - Part.1 basic
EfsPotato
CVE-2020-17144漏洞分析与武器化
Windows任意文件下载的三个Tips
CVE-2020-0688的武器化与.net反序列化漏洞那些事
POP3 MITM思路与简单实现
RemoteFreeLibrary
最新留言
Hi All.plz update code.thanks A lot.
Hey currently in an active pentest and wanted to check out your Sharepoint CVE that just dropped. Any way to contact you and discuss?
Hi.plz Update cve-2017-7269https://github.com/zcgonvh/cve-2017-7269-tool
Hello first of all very thankful for your writeup and work done on the poc and rce.Wanted to ask you how did you generate the payload? where from etc.I tried generating the exact payload of your poc for example and didnt manage to get the same result or a result that worked.I need to generate my payload from zero so if you'd be able to explain how did you do that or give the source code of yours it will be very helpfulThanks alot
I'm sorry it took me some time to find my report, I've sent you an email, please check it.
Hi,I'am currently having some difficulty in trying to reproduce the CVE-2023-21706 and CVE-2023-21710 of yours, can you give me some hints.Nguyen
6
我收回这句话,当我没说,解压密码找到了
压缩包双击打开,仔细看工具栏那里,有个《注释》选项,点开里面就是解压密码,其实楼主的名字就是解压密码
楼主是选择性回复呀,关于解压密码一个字都不提呀
分类归档
Sql
(9)
Exp
(8)
Asp.Net
(5)
Web
(4)
c/c++
(4)
域渗透
(4)
杂谈
(3)
Script
(3)
.Net
(2)
WinDbg
(2)
PowerShell
(2)
Wmi
(1)
MITM
(1)
RSS
联系方式
zcgonvh#at#qq.com
Copyright GMH's
Home
. Powered By Z-Blog.