├── Java-sec ├── CC1-LazyMap.md ├── CC1-TransformedMap.md ├── CC3.md ├── CC5.md ├── CC6.md ├── Commons-Collections4.0下的CC2和CC4.md ├── CommonsBeanutils.md ├── URLDNS.md └── 原生反序列化利用链 JDK7u21.md ├── README.md ├── 信息收集 └── README.md ├── 内网渗透 ├── Linux │ ├── Linux提权 │ │ └── 4_sudo提权.md │ └── README.md ├── README.md ├── Windows │ └── 信息收集 │ │ ├── 域内信息收集.md │ │ └── 本机基础信息收集.md └── 如何判断存不存在内网.md ├── 工具学习 └── README.md ├── 渗透思路 ├── AK | SK 获取思路.md ├── README.md ├── WAF绕过.md └── 登录框攻击面思路.md └── 漏洞研究 ├── Apache APISIX └── Apache APISIX _ 2.12.1 远程代码执行(CVE-2022-24112).md ├── Apache Shiro └── README.md ├── Atlassian Confluence ├── Confluence OGNL表达式注入代码执行漏洞(CVE-2021-26084).md ├── Confluence路径穿越与命令执行漏洞(CVE-2019-3396).md ├── Confluence远程代码执行(CVE-2022-26134).md └── README.md ├── F5-BIG-IP └── F5-BIG-IP iControl REST身份验证绕过漏洞 (CVE-2022-1388).md ├── Fastjson ├── Fastjson 1.2.24 反序列化 RCE.md ├── Fastjson 1.2.47 远程命令执行漏洞.md ├── Fastjson JDBC4Connection利用.md └── README.md ├── GitLab ├── GitLab 未授权RCE(CVE-2021-22205).md └── GitLab任意文件读取(CVE-2020-10977).md ├── Grafana ├── Grafana plugin 任意文件读取漏洞(CVE-2021-43798).md └── README.md ├── JWT └── JWT介绍和渗透思路.md ├── Jackson ├── Jackson-databind 反序列化漏洞(CVE-2017-7525).md └── README.md ├── Jenkins └── Jenkins RCE (CVE-2018-1000861).md ├── Log4j └── Log4j2 RCE(CVE-2021-44228).md ├── Memcached └── Memcached未授权访问漏洞.md ├── Nacos └── 从 Nacos CVE-2021-29441 到新型利用方式探索.md ├── Redis ├── 1、写文件.md ├── 2、主从复制RCE.md └── README.md ├── Spring ├── README.md ├── Spring Cloud Function SpEL表达式注入.md └── Spring Core-Spring4Shell RCE(CVE-2022-22965).md ├── UEditor └── UEditor漏洞总结.md ├── Zyxel └── Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525).md ├── rsync ├── README.md └── rsync未授权访问漏洞.md └── 用友 └── 用友NC65 ├── ActionHandlerServlet_Gzip反序列化.md ├── BshServlet-RCE.md ├── IUpdateService-XXE.md ├── 用友NC6.5_环境搭建及路由分析.md └── 用友NC65反序列化回显利用.md /Java-sec/CC1-LazyMap.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/Java-sec/CC1-LazyMap.md -------------------------------------------------------------------------------- /Java-sec/CC1-TransformedMap.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/Java-sec/CC1-TransformedMap.md -------------------------------------------------------------------------------- /Java-sec/CC3.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/Java-sec/CC3.md -------------------------------------------------------------------------------- /Java-sec/CC5.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/Java-sec/CC5.md -------------------------------------------------------------------------------- /Java-sec/CC6.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/Java-sec/CC6.md -------------------------------------------------------------------------------- /Java-sec/Commons-Collections4.0下的CC2和CC4.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/Java-sec/Commons-Collections4.0下的CC2和CC4.md -------------------------------------------------------------------------------- /Java-sec/CommonsBeanutils.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/Java-sec/CommonsBeanutils.md -------------------------------------------------------------------------------- /Java-sec/URLDNS.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/Java-sec/URLDNS.md -------------------------------------------------------------------------------- /Java-sec/原生反序列化利用链 JDK7u21.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/Java-sec/原生反序列化利用链 JDK7u21.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/README.md -------------------------------------------------------------------------------- /信息收集/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/信息收集/README.md -------------------------------------------------------------------------------- /内网渗透/Linux/Linux提权/4_sudo提权.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/内网渗透/Linux/Linux提权/4_sudo提权.md -------------------------------------------------------------------------------- /内网渗透/Linux/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/内网渗透/Linux/README.md -------------------------------------------------------------------------------- /内网渗透/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/内网渗透/README.md -------------------------------------------------------------------------------- /内网渗透/Windows/信息收集/域内信息收集.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/内网渗透/Windows/信息收集/域内信息收集.md -------------------------------------------------------------------------------- /内网渗透/Windows/信息收集/本机基础信息收集.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/内网渗透/Windows/信息收集/本机基础信息收集.md -------------------------------------------------------------------------------- /内网渗透/如何判断存不存在内网.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/内网渗透/如何判断存不存在内网.md -------------------------------------------------------------------------------- /工具学习/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/工具学习/README.md -------------------------------------------------------------------------------- /渗透思路/AK | SK 获取思路.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/渗透思路/AK | SK 获取思路.md -------------------------------------------------------------------------------- /渗透思路/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/渗透思路/README.md -------------------------------------------------------------------------------- /渗透思路/WAF绕过.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/渗透思路/WAF绕过.md -------------------------------------------------------------------------------- /渗透思路/登录框攻击面思路.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/渗透思路/登录框攻击面思路.md -------------------------------------------------------------------------------- /漏洞研究/Apache APISIX/Apache APISIX _ 2.12.1 远程代码执行(CVE-2022-24112).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Apache APISIX/Apache APISIX _ 2.12.1 远程代码执行(CVE-2022-24112).md -------------------------------------------------------------------------------- /漏洞研究/Apache Shiro/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Apache Shiro/README.md -------------------------------------------------------------------------------- /漏洞研究/Atlassian Confluence/Confluence OGNL表达式注入代码执行漏洞(CVE-2021-26084).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Atlassian Confluence/Confluence OGNL表达式注入代码执行漏洞(CVE-2021-26084).md -------------------------------------------------------------------------------- /漏洞研究/Atlassian Confluence/Confluence路径穿越与命令执行漏洞(CVE-2019-3396).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Atlassian Confluence/Confluence路径穿越与命令执行漏洞(CVE-2019-3396).md -------------------------------------------------------------------------------- /漏洞研究/Atlassian Confluence/Confluence远程代码执行(CVE-2022-26134).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Atlassian Confluence/Confluence远程代码执行(CVE-2022-26134).md -------------------------------------------------------------------------------- /漏洞研究/Atlassian Confluence/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Atlassian Confluence/README.md -------------------------------------------------------------------------------- /漏洞研究/F5-BIG-IP/F5-BIG-IP iControl REST身份验证绕过漏洞 (CVE-2022-1388).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/F5-BIG-IP/F5-BIG-IP iControl REST身份验证绕过漏洞 (CVE-2022-1388).md -------------------------------------------------------------------------------- /漏洞研究/Fastjson/Fastjson 1.2.24 反序列化 RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Fastjson/Fastjson 1.2.24 反序列化 RCE.md -------------------------------------------------------------------------------- /漏洞研究/Fastjson/Fastjson 1.2.47 远程命令执行漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Fastjson/Fastjson 1.2.47 远程命令执行漏洞.md -------------------------------------------------------------------------------- /漏洞研究/Fastjson/Fastjson JDBC4Connection利用.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Fastjson/Fastjson JDBC4Connection利用.md -------------------------------------------------------------------------------- /漏洞研究/Fastjson/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Fastjson/README.md -------------------------------------------------------------------------------- /漏洞研究/GitLab/GitLab 未授权RCE(CVE-2021-22205).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/GitLab/GitLab 未授权RCE(CVE-2021-22205).md -------------------------------------------------------------------------------- /漏洞研究/GitLab/GitLab任意文件读取(CVE-2020-10977).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/GitLab/GitLab任意文件读取(CVE-2020-10977).md -------------------------------------------------------------------------------- /漏洞研究/Grafana/Grafana plugin 任意文件读取漏洞(CVE-2021-43798).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Grafana/Grafana plugin 任意文件读取漏洞(CVE-2021-43798).md -------------------------------------------------------------------------------- /漏洞研究/Grafana/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Grafana/README.md -------------------------------------------------------------------------------- /漏洞研究/JWT/JWT介绍和渗透思路.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/JWT/JWT介绍和渗透思路.md -------------------------------------------------------------------------------- /漏洞研究/Jackson/Jackson-databind 反序列化漏洞(CVE-2017-7525).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Jackson/Jackson-databind 反序列化漏洞(CVE-2017-7525).md -------------------------------------------------------------------------------- /漏洞研究/Jackson/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Jackson/README.md -------------------------------------------------------------------------------- /漏洞研究/Jenkins/Jenkins RCE (CVE-2018-1000861).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Jenkins/Jenkins RCE (CVE-2018-1000861).md -------------------------------------------------------------------------------- /漏洞研究/Log4j/Log4j2 RCE(CVE-2021-44228).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Log4j/Log4j2 RCE(CVE-2021-44228).md -------------------------------------------------------------------------------- /漏洞研究/Memcached/Memcached未授权访问漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Memcached/Memcached未授权访问漏洞.md -------------------------------------------------------------------------------- /漏洞研究/Nacos/从 Nacos CVE-2021-29441 到新型利用方式探索.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Nacos/从 Nacos CVE-2021-29441 到新型利用方式探索.md -------------------------------------------------------------------------------- /漏洞研究/Redis/1、写文件.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Redis/1、写文件.md -------------------------------------------------------------------------------- /漏洞研究/Redis/2、主从复制RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Redis/2、主从复制RCE.md -------------------------------------------------------------------------------- /漏洞研究/Redis/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Redis/README.md -------------------------------------------------------------------------------- /漏洞研究/Spring/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Spring/README.md -------------------------------------------------------------------------------- /漏洞研究/Spring/Spring Cloud Function SpEL表达式注入.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Spring/Spring Cloud Function SpEL表达式注入.md -------------------------------------------------------------------------------- /漏洞研究/Spring/Spring Core-Spring4Shell RCE(CVE-2022-22965).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Spring/Spring Core-Spring4Shell RCE(CVE-2022-22965).md -------------------------------------------------------------------------------- /漏洞研究/UEditor/UEditor漏洞总结.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/UEditor/UEditor漏洞总结.md -------------------------------------------------------------------------------- /漏洞研究/Zyxel/Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/Zyxel/Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525).md -------------------------------------------------------------------------------- /漏洞研究/rsync/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/rsync/README.md -------------------------------------------------------------------------------- /漏洞研究/rsync/rsync未授权访问漏洞.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/rsync/rsync未授权访问漏洞.md -------------------------------------------------------------------------------- /漏洞研究/用友/用友NC65/ActionHandlerServlet_Gzip反序列化.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/用友/用友NC65/ActionHandlerServlet_Gzip反序列化.md -------------------------------------------------------------------------------- /漏洞研究/用友/用友NC65/BshServlet-RCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/用友/用友NC65/BshServlet-RCE.md -------------------------------------------------------------------------------- /漏洞研究/用友/用友NC65/IUpdateService-XXE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/用友/用友NC65/IUpdateService-XXE.md -------------------------------------------------------------------------------- /漏洞研究/用友/用友NC65/用友NC6.5_环境搭建及路由分析.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/用友/用友NC65/用友NC6.5_环境搭建及路由分析.md -------------------------------------------------------------------------------- /漏洞研究/用友/用友NC65/用友NC65反序列化回显利用.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/reidmu/sec-note/HEAD/漏洞研究/用友/用友NC65/用友NC65反序列化回显利用.md --------------------------------------------------------------------------------