草泥马之家
Windows与.Net.....
首页
文档
工具
留言本
Web
Windows任意文件下载的三个Tips
2020年07月24日 / 作者:zcgonvh / 分类:Web / 评论:2 / 浏览:14166
关于windows任意文件下载的几个Tips
Tags:
web
Web
webshell系列(一)--xml
2015年04月22日 / 作者:zcgonvh / 分类:Web / 评论:3 / 浏览:12486
基于xml的新式webshell~
Tags:
webshell
web
‹‹
1
››
搜索
最近发表
DCOM Potato
Advanced Windows TaskScheduler Playbook - Part.3 from RPC to lateral movement
Advanced Windows Task Scheduler Playbook - Part.2 from COM to UAC bypass and get SYSTEM dirtectly
Advanced Windows Task Scheduler Playbook - Part.1 basic
EfsPotato
CVE-2020-17144漏洞分析与武器化
Windows任意文件下载的三个Tips
CVE-2020-0688的武器化与.net反序列化漏洞那些事
POP3 MITM思路与简单实现
RemoteFreeLibrary
最新留言
Now try the ysoserial.net directly, in fact, I was submitted a pull request for it a few years ago.You just need to use `ActivitySurrogateSelectorFromFile` and pass your own backdoor assembly to generate the payload, this is the large byte array named `stub` in the source.And, if the .net framework installed on the target server is updated(I forgot the exact time, maybe after 2020), the `ActivitySurrogateDisableTypeCheck` payload is also needed, this is the small byte array named `v48disablecheck` in the source.Have fun.
Hi All.plz update code.thanks A lot.
Hey currently in an active pentest and wanted to check out your Sharepoint CVE that just dropped. Any way to contact you and discuss?
Hi.plz Update cve-2017-7269https://github.com/zcgonvh/cve-2017-7269-tool
Hello first of all very thankful for your writeup and work done on the poc and rce.Wanted to ask you how did you generate the payload? where from etc.I tried generating the exact payload of your poc for example and didnt manage to get the same result or a result that worked.I need to generate my payload from zero so if you'd be able to explain how did you do that or give the source code of yours it will be very helpfulThanks alot
I'm sorry it took me some time to find my report, I've sent you an email, please check it.
Hi,I'am currently having some difficulty in trying to reproduce the CVE-2023-21706 and CVE-2023-21710 of yours, can you give me some hints.Nguyen
6
我收回这句话,当我没说,解压密码找到了
压缩包双击打开,仔细看工具栏那里,有个《注释》选项,点开里面就是解压密码,其实楼主的名字就是解压密码
分类归档
Sql
(9)
Exp
(8)
Asp.Net
(5)
Web
(4)
c/c++
(4)
域渗透
(4)
杂谈
(3)
Script
(3)
.Net
(2)
WinDbg
(2)
PowerShell
(2)
Wmi
(1)
MITM
(1)
RSS
联系方式
zcgonvh#at#qq.com
Copyright GMH's
Home
. Powered By Z-Blog.