草泥马之家
Windows与.Net.....
首页
文档
工具
留言本
PowerShell
PowerShell恶意代码分析辅助:调试CLR
2019年07月21日 / 作者:zcgonvh / 分类:PowerShell / 评论:0 / 浏览:7411
借助Windbg脚本进行更为有效的PowerShell Hook。
Tags:
PowerShell
windbg
WinDbg
调教Windbg:移植预览版数据模型拓展
2019年03月09日 / 作者:zcgonvh / 分类:WinDbg / 评论:0 / 浏览:7531
把预览版windbg的数据模型移植到传统版本上。
Tags:
windbg
WinDbg
用WinDbg监视mysql查询
2015年03月18日 / 作者:zcgonvh / 分类:WinDbg / 评论:0 / 浏览:6756
将WinDbg当成mysql实时监视器来用~
Tags:
mysql
windbg
‹‹
1
››
搜索
最近发表
DCOM Potato
Advanced Windows TaskScheduler Playbook - Part.3 from RPC to lateral movement
Advanced Windows Task Scheduler Playbook - Part.2 from COM to UAC bypass and get SYSTEM dirtectly
Advanced Windows Task Scheduler Playbook - Part.1 basic
EfsPotato
CVE-2020-17144漏洞分析与武器化
Windows任意文件下载的三个Tips
CVE-2020-0688的武器化与.net反序列化漏洞那些事
POP3 MITM思路与简单实现
RemoteFreeLibrary
最新留言
Hey currently in an active pentest and wanted to check out your Sharepoint CVE that just dropped. Any way to contact you and discuss?
Hi.plz Update cve-2017-7269https://github.com/zcgonvh/cve-2017-7269-tool
Hello first of all very thankful for your writeup and work done on the poc and rce.Wanted to ask you how did you generate the payload? where from etc.I tried generating the exact payload of your poc for example and didnt manage to get the same result or a result that worked.I need to generate my payload from zero so if you'd be able to explain how did you do that or give the source code of yours it will be very helpfulThanks alot
I'm sorry it took me some time to find my report, I've sent you an email, please check it.
Hi,I'am currently having some difficulty in trying to reproduce the CVE-2023-21706 and CVE-2023-21710 of yours, can you give me some hints.Nguyen
6
我收回这句话,当我没说,解压密码找到了
压缩包双击打开,仔细看工具栏那里,有个《注释》选项,点开里面就是解压密码,其实楼主的名字就是解压密码
楼主是选择性回复呀,关于解压密码一个字都不提呀
yyyyyds
分类归档
Sql
(9)
Exp
(8)
Asp.Net
(5)
Web
(4)
c/c++
(4)
域渗透
(4)
杂谈
(3)
Script
(3)
.Net
(2)
WinDbg
(2)
PowerShell
(2)
Wmi
(1)
MITM
(1)
RSS
联系方式
zcgonvh#at#qq.com
Copyright GMH's
Home
. Powered By Z-Blog.