Light Mode

Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Threekiii/Awesome-Redteam

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

21 Commits

Repository files navigation

Awesome-Redteam

[(Mian Ze Sheng Ming )] Ben Xiang Mu Suo She Ji De Ji Zhu , Si Lu He Gong Ju Jin Gong Xue Xi ,Ren He Ren Bu De Jiang Qi Yong Yu Fei Fa Yong Tu He Ying Li ,Bu De Jiang Qi Yong Yu Fei Shou Quan Shen Tou Ce Shi ,Fou Ze Hou Guo Zi Xing Cheng Dan ,Yu Ben Xiang Mu Wu Guan . Shi Yong Ben Xiang Mu Qian Qing Xian Yue Du Fa Lu Fa Gui .

Disclaimer: The technologies, concepts, and tools provided in this Git repository are intended for educational and research purposes only. Any use for illegal activities, unauthorized penetration testing, or commercial purposes is strictly prohibited. Please read the Awesome-Laws before using this repository.

Yi Ge Gong Fang Zhi Shi Ku . A knowledge base for red teaming and offensive security.

means recommand Tui Jian Shi Yong

Roadmap

Mu Lu Contents

  • Xiang Mu Dao Hang Project Navigation
    • Su Cha Wen Dang CheatSheets
    • Yi Xie Dai Ma Scripts
    • Gong Fang Zhi Shi Tips
  • Kai Yuan Dao Hang Open-Source Navigation
    • Bian Jie Ma /Jia Jie Mi Cryptography
      • Zai Xian Gong Ju Online Tools
      • Chi Xian Gong Ju Offline Tools
      • Bian Ma /Jie Ma Encode/Decode
      • Zheng Ze Biao Da Shi Regular Expressions
      • Ha Xi Suan Fa Hash Algorithms
      • Gong Yao Mi Ma Suan Fa RSA
      • Guo Mi Suan Fa SM Algorithms
    • Wang Luo Kong Jian Ce Hui Cyberspace Search Engine
      • Zong He Gong Ju Nice Tools
      • Wang Ye /Duan Kou Web/Ports
      • Gu Ge Sou Suo Google Hacking
      • Github Sou Suo Github Dork
    • Kai Yuan Qing Bao Open-Source Intelligence
      • Zong He Gong Ju Nice Tools
      • Wei Xie Qing Bao Threat Intelligence
      • Lou Dong Pi Lu Disclosed Vulnerabilities
      • Jie Kou Jian Suo API Search
      • Yuan Dai Ma Jian Suo Source Code Search
    • Kai Yuan Zi Yuan Open-Source Resources
      • She Qu /Zhi Shi Ku Communities/Knowledge Base
      • Si Wei Dao Tu /Bei Wang Lu Mindmap/Cheat Sheets
      • Jin Gong Xing An Quan Red Teaming and Offensive Security
      • Fang Yu Xing An Quan Blue Teaming and Defensive Security
      • Cao Zuo An Quan Operation Security
      • Shi Zhan Ping Tai Learning and Practice Platforms
  • Xin Xi Shou Ji Reconnaissance
    • Zong He Gong Ju Nice Tools
    • IP/Yu Ming /Zi Yu Ming IP/Domain/Subdomain
    • Zhi Wen Fingerprint
      • Zhi Wen Ku Fingerprint Collection
      • Zhi Wen Shi Bie Fingerprint Reconnaissance
      • WAF Shi Bie Waf Checks
    • Sao Miao /Bao Po Brute Force
      • Sao Miao /Bao Po Gong Ju Brute Force Tools
      • Sao Miao /Bao Po Zi Dian Brute Force Dictionaries
      • Zi Dian Sheng Cheng Generate a Custom Dictionary
      • Mo Ren Kou Ling Cha Xun Default Credentials
    • She Hui Gong Cheng Xue Social Engineering
      • Ping Ju Xie Lu Leaked Credentials
      • You Xiang Email
      • Duan Xin SMS Online
      • Diao Yu Phishing
    • Yi Dong Duan Mobile
  • Lou Dong Yan Jiu Vulnerability Research
    • Lou Dong Huan Jing Vulnerable Environments
      • Ji Chu Lou Dong Basic Vulnerabilities
      • Zong He Lou Dong Comprehensive Vulnerabilities
      • Gong Kong Huan Jing Vulnerable IoT Environment
      • Yu Huan Jing Vulnerable Active Directory Environment
      • Yun Huan Jing Vulnerable Cloud Environments
      • AI Huan Jing Vulnerable AI Environments
    • PoC Proof of Concept
      • PoC/ExP
      • PoC Mo Ban PoC Templates
  • Lou Dong Li Yong Vulnerability Exploits
    • Zong He Gong Ju Nice Tools
    • Dai Ma Shen Ji Code Audit
    • Xu Lie Hua Serialization
      • Java
    • Fan Xu Lie Hua Deserialization
      • Java
      • PHP
    • Shu Ju Ku Database
      • Redis
      • MySQL
      • Oracle
      • MSSQL
    • Xin Xi Xie Lu Information Disclosure
    • CMS/OA Lou Dong CMS/OA
    • Zhong Jian Jian /Ying Yong Ceng Middleware/Application
  • Shen Tou Ce Shi Penetration Testing
    • Zong He Gong Ju Nice Tools
    • Shen Tou Cha Jian Extensions
      • Chrome
      • Burpsuite
      • Yakit
    • Fu Zhu Gong Ju Auxiliary Tools
      • Gong Ju Ji Open-Source Toolkit
      • Dai Wai Tong Dao DNSLog
      • Zhong Duan You Hua Command Line
      • Dai Ma Mei Hua Beautifier
      • Sheng Cheng Qi Generator
    • SQL Zhu Ru SQL Injection
    • Fang Wen Kong Zhi Access Control
      • 403 Rao Guo Bypass 40X errors
    • Kua Zhan Jiao Ben XSS
    • Wen Jian Bao Han File Inclusion
    • Fu Wu Duan Qing Qiu Wei Zao SSRF
    • Yi Dong Duan An Quan Mobile Security
      • Xiao Cheng Xu Mini Program
      • Ying Yong Cheng Xu APK
      • SessionKey Jie Mi SessionKey
    • Zai He Yu Rao Guo Payload and Bypass
  • Nei Wang Shen Tou Red Teaming and Offensive Security
    • Ji Chu She Shi Infrastructure
    • Xin Xi Shou Ji Reconnaissance
    • Ping Zheng Huo Qu Credential Access
      • Ping Zheng Zhuan Chu Credential Dumping
      • Ben Di Mei Ju Local Enumeration
      • Ha Xi Po Jie NTLM Cracking
    • Hou Shen Tou Post Exploitation
      • Zong He Gong Ju Nice Tools
      • Er Jin Zhi Ku Binaries and Libraries
    • Quan Xian Wei Chi Persistence
      • Nei Cun Ma MemShell
      • Webshell Guan Li Webshell Management
      • Webshell Mian Sha Webshell Bypass
      • Fan Dan Shell Guan Li Reverse Shell Management
    • Quan Xian Ti Sheng Privilege Escalation
      • Linux Ben Di Mei Ju Linux Local Enumeration
      • Windows Ben Di Mei Ju Windows Local Enumeration
      • Windows Ti Quan Windows Exploits
      • Linux Ti Quan Linux Exploits
      • Shu Ju Ku Ti Quan Database Exploits
    • Fang Yu Gui Bi Defense Evasion
      • Linux Fang Yu Gui Bi Linux Defense Evasion
      • Windows Fang Yu Gui Bi Windows Defense Evasion
    • Nei Wang Chuan Tou Proxy
      • Dai Li Ke Hu Duan Proxy Client
      • Dai Li Gong Ju Proxy Tools
      • DNS Sui Dao DNS Tunnel
      • ICMP Sui Dao ICMP Tunnel
      • Duan Kou Zhuan Fa Port Forwarding
    • Cao Zuo An Quan Operation Security
  • Yu Shen Tou Active Directory Penetration
    • Yu Nei Xin Xi Shou Ji Collection and Discovery
    • Yu Nei Quan Xian Ti Sheng Privilege Escalation
    • Yu Nei Lou Dong Li Yong Known Exploited Vulnerabilities
      • MS14-068
      • noPac
      • Zerologon
      • ProxyLogon/ProxyShell
      • ProxyNotShell
      • Printnightmare
    • Yu Nei Shen Tou Fang Shi Methodology
      • Coerce and Relay
      • Delegation
      • ADCS
      • ACLs and ACEs
  • Fang Yu Xing An Quan Blue Teaming and Defensive Security
    • Nei Cun Ma Cha Sha Memshell Detection
    • Webshell Cha Sha Webshell Detection
    • Gong Ji Yan Pan Blue Teaming
    • Ji Xian Jia Gu Enforcement
    • Ying Ji Xiang Ying Incident Response
    • Le Suo Bing Du Ransomware
      • Sou Suo Yin Qing Search Engine
      • Jie Mi Gong Ju Decryption Tools
    • Kai Yuan Mi Guan Open-Source Honeypot
    • Ni Xiang Gong Cheng Reverse Engineering
      • Zong He Gong Ju Nice Tools
      • Jing Tai Fen Xi Static Analysis
      • Dong Tai Diao Shi Dynamic Analysis
      • Java
      • Mobile
      • Python
      • Rust/Go/.NET
  • Yun An Quan Cloud Security
    • Kai Yuan Zi Yuan Resources
    • Yun An Quan Ju Zhen Cloud Threat Matrix
    • Yun Fu Wu Cloud Services
      • Yun Guan Ping Tai Management Tools
      • AK/SK Li Yong AK/SK Exploit
    • Yun Yuan Sheng Cloud Native
      • Zong He Gong Ju Nice Tools
      • Rong Qi Docker
      • Ji Qun Kubernetes
  • AI An Quan AI Security
    • Kai Yuan Zi Yuan Resources
    • Mo Xing Bang Dan Yu Ping Ce Model Rankings & Evaluation Platforms
    • An Quan Wei Lan Yu Jia Gu AI Agent Security & Guardrails
    • Gong Fang Zi Dong Hua AI-Powered Red Teaming & Offensive Automation
    • Agent Skills Gong Cheng Agent Skills
  • Ti Gao Sheng Chan Li De Fu Zhu Gong Ju
    • LLM
      • Kai Yuan Zi Yuan Open-Source Resources
      • Bian Pai Kuang Jia orchestration framework
      • Ti Shi Ci Prompts
      • Bu Shu Deployment
  • Ti Gao Sheng Chan Li De Shi Yong Zi Shi
    • Ru He Kuai Su Shi Yong alias
    • Ru He You Hua Yuan Sheng Zhong Duan
    • Ru He Jie Jue Zhong Duan Zhong Wen Luan Ma

Xiang Mu Dao Hang Project Navigation

Su Cha Wen Dang CheatSheets

Chuo Zhe Li Click Here

DefaultCreds-Cheat-Sheet.csv
Huawei-iBMC-DefaultCreds.csv
Huawei-Product-Cheat-Sheet.csv
WeakPassword-Cheat-Sheet.csv
An Quan Han Shang Ji Guan Wang Lian Jie Su Cha .txt

Yi Xie Dai Ma Scripts

Chuo Zhe Li Click Here

ShellcodeWrapper: ShellcodeJia Mi
AntivirusScanner: Sha Ruan Jin Cheng Jian Ce Jiao Ben
runtime-exec-payloads.html: java.lang.Runtime.exec() PayloadsSheng Cheng
Ascii2Char: ASCIIMa He Zi Fu Hu Xiang Zhuan Huan Jiao Ben Xiu Gai webshellWen Jian Ming Mi Ma
Weakpass_Generator: Zai Xian Ruo Mi Ma Sheng Cheng Gong Ju Yi Hua Ban
Godzilla_Decryptor: Ge Si La Liu Liang Jie Mi
Behinder4_Key_Bruteforce: Bing He 4Mi Yao Bao Po
Flask_Session_Decryptor: Flask sessionZhu Ru Jie Mi

Gong Fang Zhi Shi Tips

Chuo Zhe Li Click Here

Xin Xi Shou Ji -Min Gan Xin Xi Shou Ji
Nei Wang Shen Tou -Mian Sha
Nei Wang Shen Tou -Yin Cang
Nei Wang Shen Tou -Pentesting AD Mindmap
An Quan Jia Gou -Wang Luo Gong Ji Yu Fang Yu Tu Pu
Ping Tai Da Jian -DNS Log
Liu Liang Fen Xi -CobaltStrike
Liu Liang Fen Xi -Webshell
She Hui Gong Cheng Xue -Diao Yu You Jian Zhu Ti Hui Zong
Ni Xiang Fen Xi -Wei Xin Xiao Cheng Xu Fan Bian Yi

Kai Yuan Dao Hang Open-Source Navigation

Bian Jie Ma /Jia Jie Mi Cryptography

Zai Xian Gong Ju Online Tools

Chi Xian Gong Ju Offline Tools

Bian Ma /Jie Ma Encode/Decode

Zheng Ze Biao Da Shi Regular Expressions

Ha Xi Suan Fa Hash Algorithms

Gong Yao Mi Ma Suan Fa RSA

Guo Mi Suan Fa SM Algorithms

Wang Luo Kong Jian Ce Hui Cyberspace Search Engine

Zong He Gong Ju Nice Tools

Wang Ye /Duan Kou Web/Ports

Gu Ge Sou Suo Google Hacking

Github Sou Suo Github Dork

Kai Yuan Qing Bao Open-Source Intelligence

Zong He Gong Ju Nice Tools

Wei Xie Qing Bao Threat Intelligence

Lou Dong Pi Lu Disclosed Vulnerabilities

Jie Kou Jian Suo API Search

Yuan Dai Ma Jian Suo Source Code Search

Kai Yuan Zi Yuan Open-Source Resources

She Qu /Zhi Shi Ku Communities/Knowledge Base

Si Wei Dao Tu /Bei Wang Lu Mindmap/Cheat Sheets

Jin Gong Xing An Quan Red Teaming and Offensive Security

Fang Yu Xing An Quan Blue Teaming and Defensive Security

Cao Zuo An Quan Operation Security

Shi Zhan Ping Tai Learning and Practice Platforms

Mac M1 Shi Yong Vulnhub Deng ova Ge Shi Jing Xiang ,Xu Yao Jiang ova Ge Shi Zhuan Wei qcow2,Zai Tong Guo UTM Yun Xing :

Xin Xi Shou Ji Reconnaissance

Zong He Gong Ju Nice Tools

IP/Yu Ming /Zi Yu Ming IP/Domain/Subdomain

Zhi Wen Fingerprint

Zhi Wen Ku Fingerprint Collection

Zhi Wen Shi Bie Fingerprint Reconnaissance

WAF Shi Bie Waf Checks

Sao Miao /Bao Po Brute Force

Sao Miao /Bao Po Gong Ju Brute Force Tools

Sao Miao /Bao Po Zi Dian Brute Force Dictionaries

Zi Dian Sheng Cheng Generate a Custom Dictionary

Mo Ren Kou Ling Cha Xun Default Credentials

She Hui Gong Cheng Xue Social Engineering

Ping Ju Xie Lu Leaked Credentials

You Xiang Email

Duan Xin SMS Online

Diao Yu Phishing

Yi Dong Duan Mobile

Lou Dong Yan Jiu Vulnerability Research

Lou Dong Huan Jing Vulnerable Environments

Ji Chu Lou Dong Basic Vulnerabilities

Zong He Lou Dong Comprehensive Vulnerabilities

Gong Kong Huan Jing Vulnerable IoT Environment

Yu Huan Jing Vulnerable Active Directory Environment

Yun Huan Jing Vulnerable Cloud Environments

AI Huan Jing Vulnerable AI Environments

PoC Proof of Concept

Be careful Malware,POC Ku Zui Xin De CVE Ke Neng Cun Zai Tou Du Feng Xian .

PoC/ExP

PoC Mo Ban PoC Templates

Lou Dong Li Yong Vulnerability Exploits

Zong He Gong Ju Nice Tools

Dai Ma Shen Ji Code Audit

Xu Lie Hua Serialization

Java

Fan Xu Lie Hua Deserialization

Java

PHP

Shu Ju Ku Database

Redis

MySQL

Oracle

MSSQL

Xin Xi Xie Lu Information Disclosure

CMS/OA Lou Dong CMS/OA

Zhong Jian Jian /Ying Yong Ceng Middleware/Application

Confluence

Druid

Fastjson

GitLab

Nacos

Nps

Java

Shiro

Struts

Spring Boot

Tomcat

Thinkphp

Weblogic

WebSocket

vCenter

Zookeeper

Shen Tou Ce Shi Penetration Testing

Zong He Gong Ju Nice Tools

Shen Tou Cha Jian Extensions

Chrome

Burpsuite

Yakit

Fu Zhu Gong Ju Auxiliary Tools

Gong Ju Ji Open-Source Toolkit

Dai Wai Tong Dao DNSLog

Zhong Duan You Hua Command Line

Dai Ma Mei Hua Beautifier

Sheng Cheng Qi Generator

SQL Zhu Ru SQL Injection

Fang Wen Kong Zhi Access Control

403 Rao Guo Bypass 40X errors

Kua Zhan Jiao Ben XSS

Wen Jian Bao Han File Inclusion

Fu Wu Duan Qing Qiu Wei Zao SSRF

Yi Dong Duan An Quan Mobile Security

Xiao Cheng Xu Mini Program

Ying Yong Cheng Xu APK

SessionKey Jie Mi SessionKey

Zai He Yu Rao Guo Payload and Bypass

Nei Wang Shen Tou Red Teaming and Offensive Security

Ji Chu She Shi Infrastructure

Xin Xi Shou Ji Reconnaissance

Ping Zheng Huo Qu Credential Access

Ping Zheng Zhuan Chu Credential Dumping

Ben Di Mei Ju Local Enumeration

Ha Xi Po Jie NTLM Cracking

Hou Shen Tou Post Exploitation

Zong He Gong Ju Nice Tools

Er Jin Zhi Ku Binaries and Libraries

Quan Xian Wei Chi Persistence

Nei Cun Ma MemShell

Webshell Guan Li Webshell Management

Webshell Mian Sha Webshell Bypass

Fan Dan Shell Guan Li Reverse Shell Management

Quan Xian Ti Sheng Privilege Escalation

Linux Ben Di Mei Ju Linux Local Enumeration

Windows Ben Di Mei Ju Windows Local Enumeration

Windows Ti Quan Windows Exploits

Linux Ti Quan Linux Exploits

Shu Ju Ku Ti Quan Database Exploits

Fang Yu Gui Bi Defense Evasion

Linux Fang Yu Gui Bi Linux Defense Evasion

Windows Fang Yu Gui Bi Windows Defense Evasion

Nei Wang Chuan Tou Proxy

Dai Li Ke Hu Duan Proxy Client

Dai Li Gong Ju Proxy Tools

DNS Sui Dao DNS Tunnel

ICMP Sui Dao ICMP Tunnel

Duan Kou Zhuan Fa Port Forwarding

Cao Zuo An Quan Operation Security

Yu Shen Tou Active Directory Penetration

Yu Nei Xin Xi Shou Ji Collection and Discovery

Yu Nei Quan Xian Ti Sheng Privilege Escalation

Yu Nei Lou Dong Li Yong Known Exploited Vulnerabilities

MS14-068

noPac

CVE-2021-42278/CVE-2021-42287

Zerologon

CVE-2020-1472

ProxyLogon/ProxyShell

CVE-2021-34473

ProxyNotShell

CVE-2022-41040/CVE-2022-41082

Printnightmare

CVE-2021-34527/CVE-2021-1675

Yu Nei Shen Tou Fang Shi Methodology

Coerce and Relay

Delegation

ADCS

Active Directory Certificate Services

ACLs and ACEs

Fang Yu Xing An Quan Blue Teaming and Defensive Security

Nei Cun Ma Cha Sha Memshell Detection

Webshell Cha Sha Webshell Detection

Gong Ji Yan Pan Blue Teaming

Ji Xian Jia Gu Enforcement

Ying Ji Xiang Ying Incident Response

Le Suo Bing Du Ransomware

Sou Suo Yin Qing Search Engine

Jie Mi Gong Ju Decryption Tools

Kai Yuan Mi Guan Open-Source Honeypot

Ni Xiang Gong Cheng Reverse Engineering

Zong He Gong Ju Nice Tools

Jing Tai Fen Xi Static Analysis

Dong Tai Diao Shi Dynamic Analysis

Java

Mobile

Python

Rust/Go/.NET

Yun An Quan Cloud Security

Kai Yuan Zi Yuan Resources

Yun An Quan Ju Zhen Cloud Threat Matrix

Yun Fu Wu Cloud Services

San Da Yun Fu Wu Ti Gong Shang : - Amazon Web Services (AWS) / Microsoft Azure / Google Cloud Platform (GCP) - A Li Yun / Teng Xun Yun / Hua Wei Yun

Yun Guan Ping Tai Management Tools

AK/SK Li Yong AK/SK Exploit

Yun Yuan Sheng Cloud Native

Zong He Gong Ju Nice Tools

Rong Qi Docker

Ji Qun Kubernetes

AI An Quan AI Security

Kai Yuan Zi Yuan Resources

Mo Xing Bang Dan Yu Ping Ce Model Rankings & Evaluation Platforms

An Quan Wei Lan Yu Jia Gu AI Agent Security & Guardrails

Gong Fang Zi Dong Hua AI-Powered Red Teaming & Offensive Automation

Some projects may not be fully tested. Use with caution. Bu Fen Xiang Mu Wei Jing Wan Zheng Ce Shi ,Qing Jin Shen Shi Yong .

Agent Skills Gong Cheng Agent Skills

Ti Gao Sheng Chan Li De Fu Zhu Gong Ju

LLM

Kai Yuan Zi Yuan Open-Source Resources

Bian Pai Kuang Jia orchestration framework

Ti Shi Ci Prompts

Bu Shu Deployment

Ru Guo Ni Xiang Tong Guo ollama Zai Ben Di Kuai Su Bu Shu LLM,Ke Yi Can Kao Zhe Tao Ji Zhu Zhan :

  • Yun Xing Da Xing Yu Yan Mo Xing :ollama
  • Yun Xing Da Xing Yu Yan Mo Xing Bing Bu Shu WebUI:ollama + open-webui
  • Yun Xing Da Xing Yu Yan Mo Xing Bing Bu Shu Ying Yong Cheng Xu :ollama + enchanted
  • Yun Xing Da Xing Yu Yan Mo Xing Bing Yu Ben Di Bian Ji Qi Ji Cheng (Li Ru Obsidian):ollama + copilot(Obsidian Cha Jian )
  • Yun Xing Da Xing Yu Yan Mo Xing Bing Yu Ben Di Dai Ma Bian Ji Qi Ji Cheng (Li Ru Vscode): ollama + continue(Vscode Cha Jian )
  • Yun Xing Da Xing Yu Yan Mo Xing Bing Gou Jian Ben Di RAG Ying Yong :ollama + langchain
  • ...

Ti Gao Sheng Chan Li De Shi Yong Zi Shi

Ru He Kuai Su Shi Yong alias

Windows Chuang Jian alias.bat,Ji Huo conda Xu Ni Huan Jing ,Zai Ge Chi Huan Jing Xia Yun Xing Cheng Xu Huo Gong Ju . Shuang Ji alias.bat,Zhong Qi cmd,Pei Zhi Sheng Xiao .

@echo off
:: Software
@DOSKEY ida64=activate base$t"D:\CTFTools\Cracking\IDA_7.7\ida64.exe"

:: Tools
@DOSKEY fscan=cd /d D:\Software\HackTools\fscan$tactivate security$tdir

Jiang alias.bat Pei Zhi Wei Kai Ji Zi Qi Dong :

  • Zhu Ce Biao Jin Ru Ji Suan Ji \HKEY_CURRENT_USER\Software\Microsoft\Command Processor;
  • Chuang Jian Zi Fu Chuan Zhi autorun,Fu Zhi Wei alias.bat Suo Zai Wei Zhi ,Li Ru D: \Software\alias.bat;
  • Zhong Qi Xi Tong ,Pei Zhi Sheng Xiao .

MacOS Bian Ji .zshrc,Zhong Qi shell,Pei Zhi Sheng Xiao :

# 3. Control and Command
alias behinder="cd /Users/threekiii/HackTools/C2/Behinder_v4.1/ && /Library/Java/JavaVirtualMachines/jdk-1.8.jdk/Contents/Home/ bin/java -jar Behinder.jar "
alias godzilla="cd /Users/threekiii/HackTools/C2/Godzilla_v4.0.1/ && /Library/Java/JavaVirtualMachines/jdk-1.8.jdk/Contents/Home/ bin/java -jar godzilla.jar "

Ru He You Hua Yuan Sheng Zhong Duan

Windows Tong Guo tabby + clink You Hua Yuan Sheng Zhong Duan ,Shi Xian Ming Ling Zi Dong Bu Quan , vps ssh/ftp/sftp, Shu Chu Ri Zhi Ji Lu Deng Gong Neng :

MacOS Tong Guo warp + ohmyzsh You Hua Yuan Sheng Zhong Duan ,warp Zi Dai Ming Ling Zi Dong Bu Quan ,Yin Ru "Kuai "Gai Nian ,Ti Gong Liao Geng Xian Dai Hua De Bian Cheng Ti Yan (Modern UX and Text Editing):

Ru He Jie Jue Zhong Duan Zhong Wen Luan Ma

Windows Zhu Ce Biao Jin Ru Ji Suan Ji \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor,Chuang Jian Zi Fu Chuan Zhi autorun,Fu Zhi Wei chcp 65001.

About

Yi Ge Gong Fang Zhi Shi Ku . A knowledge base for red teaming and offensive security.

Topics

Resources

Readme

Stars

Watchers

Forks

Packages

Contributors