Name: backlion
Type: User
Company: 渗透测试研究中心公众号【渗透测试研究中心】
Bio: Penetration Testing,WEB Security Research,Red Team, penetration testing and Research Center --->>http://www.cnblogs.com/backlion
Location: **成都
Blog: http://www.cnblogs.com/backlion
backlion's Projects
CVE-2019-2725 poc and exp
Confluence 未授权 RCE (CVE-2019-3396) 漏洞
CVE-2019-3396 confluence SSTI RCE
CVE-2019-5418 - File Content Disclosure on Rails
FileReader Exploit
🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻
Exploit and detect tools for CVE-2020-0688
CVE-2020-0688_EXP Auto trigger payload & encrypt method
CVE-2020-0688 - Exchange
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Exploit for WebSocket Vulnerability in Apache Tomcat
PoC for Zerologon - all research credits go to Tom Tervoort of Secura
cve-2020-1472 复现利用及其exp
CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。
几条关于CVE-2020-15148(yii2反序列化)的绕过
CVE-2020-15227 exploit
Writeup of CVE-2020-15906
CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation
Exchange2010 authorized RCE
Collect S2-061 payloads
CVE-2020-1938
CVE-2020-35728 & Jackson-databind RCE
CVE-2020-36179~82 Jackson-databind SSRF&RCE
PoC CVE-2020-6308