Skip to content

BeichenDream/GodzillaMemoryShellProject.NET

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

GodzillaMemoryShellProject.NET

使用场景

当目标存在反序列化漏洞或其它漏洞,我们可以通过加载此项目的类来获得无文件的内存Shell

姊妹项目(Java 内存Shell):https://github.com/BeichenDream/GodzillaMemoryShellProject

如何使用

Web Demo

image

InjectVirtualPathProviderMemoryShell

连接时URL填写目标已存在的可执行脚本,如aspx/asmx/ashx/soap http://127.0.0.1:80/Test.aspx

image

InjectHttpListenerMemoryShell

连接时URL填写httpListenerURL,如http://127.0.0.1:80/godzilla/ http://127.0.0.1:80/ews/soap/

image

InjectHttpWebRouteMemoryShell

连接时URL填写目标已存在的路由,如http://localhost/Home/About

image

引用

https://github.com/knownsec/KCon/blob/master/2021/%E9%AB%98%E7%BA%A7%E6%94%BB%E9%98%B2%E6%BC%94%E7%BB%83%E4%B8%8B%E7%9A%84Webshell.pdf

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages