Name: backlion
Type: User
Company: 渗透测试研究中心公众号【渗透测试研究中心】
Bio: Penetration Testing,WEB Security Research,Red Team, penetration testing and Research Center --->>http://www.cnblogs.com/backlion
Location: **成都
Blog: http://www.cnblogs.com/backlion
backlion's Projects
CVE-2018-15982_EXP_IE
Linux 内核VMA-UAF 提权漏洞(CVE-2018-17182),0day
CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.
exp for https://research.checkpoint.com/extracting-code-execution-from-winrar
CVE-2018-2893
cve-2018-2894 不同别人的利用方法。
CVE-2018-2894 WebLogic 未授权访问致任意文件上传/RCE漏洞检查脚本
CVE-2018-3191
CVE-2018-3191 反弹shell
CVE-2018-3245-PoC
CVE-2018-3245
CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7
CVE-2018-8120 Windows LPE exploit
CVE-2018-8174 - VBScript memory corruption exploit.
CVE-2018-8174_python
cve-2018-8453 exp
CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability
Arbitrary code execution with kernel privileges using CVE-2018-8897.
RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl
CVE-2019-0230 & s2-059 poc.
Apache Tomcat Remote Code Execution on Windows
dump
Using CVE-2019-0708 to Locally Promote Privileges in Windows 10 System
3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
CVE-2019-1040 with Exchange
EoP POC for CVE-2019-1132
CVE-2019-2725 poc and exp
Confluence 未授权 RCE (CVE-2019-3396) 漏洞