René's URL Explorer Experiment


Title: GitHub - Getshell/Mshell: Memshell-攻防内存马研究

Open Graph Title: GitHub - Getshell/Mshell: Memshell-攻防内存马研究

X Title: GitHub - Getshell/Mshell: Memshell-攻防内存马研究

Description: Memshell-攻防内存马研究 . Contribute to Getshell/Mshell development by creating an account on GitHub.

Open Graph Description: Memshell-攻防内存马研究 . Contribute to Getshell/Mshell development by creating an account on GitHub.

X Description: Memshell-攻防内存马研究 . Contribute to Getshell/Mshell development by creating an account on GitHub.

Opengraph URL: https://github.com/Getshell/Mshell

X: @github

direct link

Domain: patch-diff.githubusercontent.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:dd97d58d-2aab-6091-6889-96c5041e423d
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-idD7C2:13D6E:2458060:315294F:69708D45
html-safe-noncead23dd25d5a3fd08d258def1379574111330c9afa0166754c6cd2f07a53a16b0
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJEN0MyOjEzRDZFOjI0NTgwNjA6MzE1Mjk0Rjo2OTcwOEQ0NSIsInZpc2l0b3JfaWQiOiIzNTIwMzczODAyODE2MDE1Njg1IiwicmVnaW9uX2VkZ2UiOiJpYWQiLCJyZWdpb25fcmVuZGVyIjoiaWFkIn0=
visitor-hmac9bc9bae9b5339438c8acc400eeb27a473a3560f4b043b066f2398b87429a5247
hovercard-subject-tagrepository:486092329
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/Getshell/Mshell
twitter:imagehttps://opengraph.githubassets.com/cd00872efad0bf4750b8d8d376e5af8b14ce3e608d13c9b1ee0334ca2874f35e/Getshell/Mshell
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/cd00872efad0bf4750b8d8d376e5af8b14ce3e608d13c9b1ee0334ca2874f35e/Getshell/Mshell
og:image:altMemshell-攻防内存马研究 . Contribute to Getshell/Mshell development by creating an account on GitHub.
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
None9920a62ba22d06470388e2904804fb7e5ec51c9e35f81784e9191394c74b2bd2
turbo-cache-controlno-preview
go-importgithub.com/Getshell/Mshell git https://github.com/Getshell/Mshell.git
octolytics-dimension-user_id95992547
octolytics-dimension-user_loginGetshell
octolytics-dimension-repository_id486092329
octolytics-dimension-repository_nwoGetshell/Mshell
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forkfalse
octolytics-dimension-repository_network_root_id486092329
octolytics-dimension-repository_network_root_nwoGetshell/Mshell
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release7d6181066430cc06553c8396ca201e194ae33cb9
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/Getshell/Mshell#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FGetshell%2FMshell
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FGetshell%2FMshell
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=Getshell%2FMshell
Reloadhttps://patch-diff.githubusercontent.com/Getshell/Mshell
Reloadhttps://patch-diff.githubusercontent.com/Getshell/Mshell
Reloadhttps://patch-diff.githubusercontent.com/Getshell/Mshell
Getshell https://patch-diff.githubusercontent.com/Getshell
Mshellhttps://patch-diff.githubusercontent.com/Getshell/Mshell
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2FGetshell%2FMshell
Fork 112 https://patch-diff.githubusercontent.com/login?return_to=%2FGetshell%2FMshell
Star 931 https://patch-diff.githubusercontent.com/login?return_to=%2FGetshell%2FMshell
931 stars https://patch-diff.githubusercontent.com/Getshell/Mshell/stargazers
112 forks https://patch-diff.githubusercontent.com/Getshell/Mshell/forks
Branches https://patch-diff.githubusercontent.com/Getshell/Mshell/branches
Tags https://patch-diff.githubusercontent.com/Getshell/Mshell/tags
Activity https://patch-diff.githubusercontent.com/Getshell/Mshell/activity
Star https://patch-diff.githubusercontent.com/login?return_to=%2FGetshell%2FMshell
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2FGetshell%2FMshell
Code https://patch-diff.githubusercontent.com/Getshell/Mshell
Issues 3 https://patch-diff.githubusercontent.com/Getshell/Mshell/issues
Pull requests 0 https://patch-diff.githubusercontent.com/Getshell/Mshell/pulls
Actions https://patch-diff.githubusercontent.com/Getshell/Mshell/actions
Projects 0 https://patch-diff.githubusercontent.com/Getshell/Mshell/projects
Security Uh oh! There was an error while loading. Please reload this page. https://patch-diff.githubusercontent.com/Getshell/Mshell/security
Please reload this pagehttps://patch-diff.githubusercontent.com/Getshell/Mshell
Insights https://patch-diff.githubusercontent.com/Getshell/Mshell/pulse
Code https://patch-diff.githubusercontent.com/Getshell/Mshell
Issues https://patch-diff.githubusercontent.com/Getshell/Mshell/issues
Pull requests https://patch-diff.githubusercontent.com/Getshell/Mshell/pulls
Actions https://patch-diff.githubusercontent.com/Getshell/Mshell/actions
Projects https://patch-diff.githubusercontent.com/Getshell/Mshell/projects
Security https://patch-diff.githubusercontent.com/Getshell/Mshell/security
Insights https://patch-diff.githubusercontent.com/Getshell/Mshell/pulse
Brancheshttps://patch-diff.githubusercontent.com/Getshell/Mshell/branches
Tagshttps://patch-diff.githubusercontent.com/Getshell/Mshell/tags
https://patch-diff.githubusercontent.com/Getshell/Mshell/branches
https://patch-diff.githubusercontent.com/Getshell/Mshell/tags
59 Commitshttps://patch-diff.githubusercontent.com/Getshell/Mshell/commits/main/
https://patch-diff.githubusercontent.com/Getshell/Mshell/commits/main/
01-内存马资源https://patch-diff.githubusercontent.com/Getshell/Mshell/tree/main/01-%E5%86%85%E5%AD%98%E9%A9%AC%E8%B5%84%E6%BA%90
01-内存马资源https://patch-diff.githubusercontent.com/Getshell/Mshell/tree/main/01-%E5%86%85%E5%AD%98%E9%A9%AC%E8%B5%84%E6%BA%90
02-内存马原理https://patch-diff.githubusercontent.com/Getshell/Mshell/tree/main/02-%E5%86%85%E5%AD%98%E9%A9%AC%E5%8E%9F%E7%90%86
02-内存马原理https://patch-diff.githubusercontent.com/Getshell/Mshell/tree/main/02-%E5%86%85%E5%AD%98%E9%A9%AC%E5%8E%9F%E7%90%86
03-内存马实战https://patch-diff.githubusercontent.com/Getshell/Mshell/tree/main/03-%E5%86%85%E5%AD%98%E9%A9%AC%E5%AE%9E%E6%88%98
03-内存马实战https://patch-diff.githubusercontent.com/Getshell/Mshell/tree/main/03-%E5%86%85%E5%AD%98%E9%A9%AC%E5%AE%9E%E6%88%98
04-内存马查杀https://patch-diff.githubusercontent.com/Getshell/Mshell/tree/main/04-%E5%86%85%E5%AD%98%E9%A9%AC%E6%9F%A5%E6%9D%80
04-内存马查杀https://patch-diff.githubusercontent.com/Getshell/Mshell/tree/main/04-%E5%86%85%E5%AD%98%E9%A9%AC%E6%9F%A5%E6%9D%80
05-内存马参考https://patch-diff.githubusercontent.com/Getshell/Mshell/tree/main/05-%E5%86%85%E5%AD%98%E9%A9%AC%E5%8F%82%E8%80%83
05-内存马参考https://patch-diff.githubusercontent.com/Getshell/Mshell/tree/main/05-%E5%86%85%E5%AD%98%E9%A9%AC%E5%8F%82%E8%80%83
README.mdhttps://patch-diff.githubusercontent.com/Getshell/Mshell/blob/main/README.md
README.mdhttps://patch-diff.githubusercontent.com/Getshell/Mshell/blob/main/README.md
READMEhttps://patch-diff.githubusercontent.com/Getshell/Mshell
https://patch-diff.githubusercontent.com/Getshell/Mshell#mshell-攻防内存马研究
https://camo.githubusercontent.com/6ee6948cdc45dca155755d2c913ae72ef05e2013d94e6d5aef1da055ade0cc41/68747470733a2f2f736f6369616c6966792e6769742e63692f4765747368656c6c2f4d7368656c6c2f696d6167653f6465736372697074696f6e3d3126666f6e743d496e74657226666f726b733d31266973737565733d31266c616e67756167653d31266e616d653d31266f776e65723d31267061747465726e3d43697263756974253230426f617264267374617267617a6572733d31267468656d653d4c69676874
0e0whttps://github.com/0e0w
01-内存马资源https://github.com/Getshell/Mshell#01-%E5%86%85%E5%AD%98%E9%A9%AC%E8%B5%84%E6%BA%90
02-内存马原理https://github.com/Getshell/Mshell#02-%E5%86%85%E5%AD%98%E9%A9%AC%E5%8E%9F%E7%90%86
03-内存马实战https://github.com/Getshell/Mshell#03-%E5%86%85%E5%AD%98%E9%A9%AC%E5%AE%9E%E6%88%98
04-内存马查杀https://github.com/Getshell/Mshell#04-%E5%86%85%E5%AD%98%E9%A9%AC%E6%9F%A5%E6%9D%80
05-内存马老师https://github.com/Getshell/Mshell#05-%E5%86%85%E5%AD%98%E9%A9%AC%E8%80%81%E5%B8%88
https://patch-diff.githubusercontent.com/Getshell/Mshell#01-内存马资源
内存马探究https://www.anquanke.com/post/id/279160
Java内存马攻防实战——攻击基础篇https://www.anquanke.com/post/id/273250
主机安全技术剖析-手把手教会你防御Java内存马https://www.anquanke.com/post/id/274443
深入浅出内存马(一)https://www.freebuf.com/articles/network/307970.html
深入浅出内存马(二)https://www.freebuf.com/articles/web/287989.html
一文看懂内存马https://www.freebuf.com/articles/web/274466.html
Java安全学习——内存马https://goodapple.top/archives/1355
手把手教你实现tomcat内存马https://www.freebuf.com/articles/web/333625.html
内存马的攻防博弈之旅http://blog.nsfocus.net/webshell-interceptor/
Tomcat内存马——Filter/servlet/Listener/valvehttps://xz.aliyun.com/t/11988
Spring内存马——Controller/Interceptor构造https://xz.aliyun.com/t/12047
JavaWeb 内存马一周目通关攻略https://su18.org/post/memory-shell/
JavaWeb 内存马二周目通关攻略https://su18.org/post/memory-shell-2/
JAVA内存马的“一生”https://xz.aliyun.com/t/11003
论如何优雅的注入Java Agent内存马https://mp.weixin.qq.com/s/xxaOsJdRE5OoRkMLkIj3Lg
Java内存攻击技术漫谈https://xz.aliyun.com/t/10075
一种新的Tomcat内存马 - Upgrade内存马https://tttang.com/archive/1709/
Shell中的幽灵王者—JAVAWEB 内存马 【认知篇】https://nosec.org/home/detail/5049.html
Goby 利用内存马中的一些技术细节【技术篇】https://nosec.org/home/detail/5077.html
用 Goby 通过反序列化漏洞一键打入内存马【利用篇】https://nosec.org/home/detail/5059.html
Tomcat 源代码调试笔记 - 看不见的 Shellhttps://mp.weixin.qq.com/s/x4pxmeqC1DvRi9AdxZ-0Lw
Tomcat 源代码调试 - 看不见的 Shell 第二式增强之无痕https://mp.weixin.qq.com/s/7b3Fyu_K6ZRgKlp6RkdYoA
Tomcat 源代码调试 - 看不见的 Shell 第二式之隐藏任意 Jsp 文件https://mp.weixin.qq.com/s/1ZiLD396088TxiW_dUOFsQ
Java内存马系列-01-基础内容学习https://drun1baby.top/2022/08/19/Java%E5%86%85%E5%AD%98%E9%A9%AC%E7%B3%BB%E5%88%97-01-%E5%9F%BA%E7%A1%80%E5%86%85%E5%AE%B9%E5%AD%A6%E4%B9%A0/
Java内存马系列-02-内存马介绍https://drun1baby.top/2022/08/21/Java%E5%86%85%E5%AD%98%E9%A9%AC%E7%B3%BB%E5%88%97-02-%E5%86%85%E5%AD%98%E9%A9%AC%E4%BB%8B%E7%BB%8D/
Java内存马系列-03-Tomcat 之 Filter 型内存马https://drun1baby.top/2022/08/22/Java%E5%86%85%E5%AD%98%E9%A9%AC%E7%B3%BB%E5%88%97-03-Tomcat-%E4%B9%8B-Filter-%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC/
Java内存马系列-04-Tomcat 之 Listener 型内存马https://drun1baby.top/2022/08/27/Java%E5%86%85%E5%AD%98%E9%A9%AC%E7%B3%BB%E5%88%97-04-Tomcat-%E4%B9%8B-Listener-%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC/
Java内存马系列-05-Tomcat 之 Servlet 型内存马https://drun1baby.top/2022/09/04/Java%E5%86%85%E5%AD%98%E9%A9%AC%E7%B3%BB%E5%88%97-05-Tomcat-%E4%B9%8B-Servlet-%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC/
Java内存马系列-06-Tomcat 之 Valve 型内存马https://drun1baby.top/2022/09/07/Java%E5%86%85%E5%AD%98%E9%A9%AC%E7%B3%BB%E5%88%97-06-Tomcat-%E4%B9%8B-Valve-%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC/
Java 内存马基础知识 —— Tomcat 架构学习https://www.freebuf.com/articles/web/343094.html
Java 内存马与 JSP 不得不说的那些事儿https://www.freebuf.com/articles/web/343095.html
内存马的攻防博弈实操https://www.cnblogs.com/renhaoblog/p/16851585.html
Java利用技巧——Jetty Filter型内存马https://3gstudent.github.io/Java%E5%88%A9%E7%94%A8%E6%8A%80%E5%B7%A7-Jetty-Filter%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC
一种全新的内存马https://veo.pub/2022/memshell/
如何在攻防演练中针对内存马做好最后的安全防线?https://www.aqniu.com/vendor/72810.html
安芯网盾首发内存马攻击防护解决方案https://anxinsec.com/view/about-us/news/0115.html
Listener内存马注入分析https://sec-in.com/article/2020
某知名Java框架内存马挖掘https://forum.butian.net/share/923
Filter/Servlet型内存马的扫描抓捕与查杀https://gv7.me/articles/2020/filter-servlet-type-memshell-scan-capture-and-kill/
Webshell 内存马分析https://www.geekby.site/2021/09/webshell%E5%86%85%E5%AD%98%E9%A9%AC%E5%88%86%E6%9E%90/
防守视角tomcat内存马的查杀https://qiita.com/shimizukawasaki/items/5dc9fe780ffbf3a7699c
从零开始的内存马分析——如何骑马反杀(一)https://forum.butian.net/share/1811
从零开始的内存马分析——如何骑马反杀(二)https://forum.butian.net/share/1814
从零开始的内存马分析——如何骑马反杀(三)https://forum.butian.net/share/1853
基于tomcat的内存 Webshell 无文件攻击技术https://xz.aliyun.com/t/7388
浅析Spring类内存马https://xz.aliyun.com/t/12538
Shiro注入回显内存马https://xz.aliyun.com/t/12537
Tomcat反序列化注入回显内存马https://xz.aliyun.com/t/12494
步履维艰之Struts2内存马https://xz.aliyun.com/t/12237
Resin内存马逆袭之路https://xz.aliyun.com/t/11758
Executor内存马的实现https://xz.aliyun.com/t/11593
Executor内存马的实现(二)https://xz.aliyun.com/t/11613
java内存马分析集合https://xz.aliyun.com/t/11084
浅析JSP型内存马https://xz.aliyun.com/t/11020
Python 内存马分析https://xz.aliyun.com/t/10933
RuoYi 可用内存马https://xz.aliyun.com/t/10651
java filter马持久化https://xz.aliyun.com/t/10582
利用Fastjson注入Spring内存马https://xz.aliyun.com/t/10467
Tomcat 内存马(一)Listener型https://xz.aliyun.com/t/10358
Tomcat 内存马(二)Filter型https://xz.aliyun.com/t/10362
JSP内存马研究https://xz.aliyun.com/t/10372
JSP Webshell那些事——攻击篇(上)https://www.anquanke.com/post/id/214435
JSP Webshell那些事——攻击篇(下)https://www.anquanke.com/post/id/214483
基于Tomcat无文件Webshell研究https://mp.weixin.qq.com/s?__biz=MzI0NzEwOTM0MA==&mid=2652474966&idx=1&sn=1c75686865f7348a6b528b42789aeec8&scene=21#wechat_redirect
java内存马攻击篇https://dem0dem0.top/2022/07/18/java%E5%86%85%E5%AD%98%E9%A9%AC%E6%94%BB%E5%87%BB%E7%AF%87/
一文简析内存马攻击防护解决方案https://www.anquanke.com/post/id/236200
EXE文件内存加载https://www.anquanke.com/post/id/260054
Tomcat 内存马检测https://www.anquanke.com/post/id/219177
Spring内存木马检测思路https://www.anquanke.com/post/id/239868
一枚野生resin filter内存马调试https://www.anquanke.com/post/id/239866
Tomcat内存马之Valve和WebSocket型https://www.freebuf.com/articles/web/365822.html
自己动手写Filter型内存马https://www.freebuf.com/articles/web/365501.html
基于ysoserial的深度利用研究(命令回显与内存马)https://www.freebuf.com/articles/network/361296.html
对tomcat-servlet内存马的学习路https://www.freebuf.com/vuls/356297.html
结合CC链注入无文件Tomcat内存马https://www.freebuf.com/articles/web/354385.html
Yso-Java Hack 进阶:利用反序列化漏洞打内存马https://www.freebuf.com/articles/network/353911.html
Spring Boot RCE到内存马探索https://www.freebuf.com/articles/system/349374.html
Resin内存马逆袭之路https://www.freebuf.com/articles/web/346946.html
MSMAP:一款功能强大的内存WebShell生成工具https://www.freebuf.com/articles/system/351107.html
如何从内存加载DLLhttps://www.freebuf.com/articles/system/227996.html
JavaAgent技术在内存马中的应用https://www.freebuf.com/articles/web/323737.html
Java Agent到内存马https://www.freebuf.com/articles/web/310224.html
蓝军反治系列之打造weblogic的持久化内存马后门https://www.freebuf.com/articles/web/268728.html
擅长捉弄的内存马同学:Valve内存马https://www.freebuf.com/articles/web/348663.html
擅长捉弄的内存马同学:Agent内存马(低卡)https://www.freebuf.com/articles/web/323621.html
擅长捉弄的内存马同学:Servlet内存马https://www.freebuf.com/articles/web/322580.html
擅长捉弄的内存马同学:Listener内存马https://www.freebuf.com/articles/web/322309.html
擅长捉弄的内存马同学:Filter内存马(高甜)https://www.freebuf.com/articles/web/321975.html
手搓Filter内存马从构造到利用讲解(内存马系列篇一)https://www.freebuf.com/vuls/344284.html
完全摸透Servlet内存马(内存马系列篇二)https://www.freebuf.com/vuls/344296.html
深入底层源码的Listener内存马(内存马系列篇三)https://www.freebuf.com/vuls/344297.html
Tomcat架构之为Bypass内存马检测铺路(内存马系列篇四)https://www.freebuf.com/vuls/344793.html
绕过检测之Executor内存马浅析(内存马系列篇五)https://www.freebuf.com/vuls/344812.html
初探Upgrade内存马(内存马系列篇六)https://www.freebuf.com/vuls/345119.html
WebSocket内存马之tomcat-websocket源码实现(内存马系列篇七)https://www.freebuf.com/vuls/345739.html
再探WebSocket内存马(内存马系列篇八)https://www.freebuf.com/vuls/346129.html
初探Spring内存马之Controller(内存马系列篇九)https://www.freebuf.com/vuls/346315.html
再谈Spring内存马之Interceptor(内存马系列篇十)https://www.freebuf.com/vuls/346644.html
浅析Tomcat架构上的Valve内存马(内存马系列篇十一)https://www.freebuf.com/vuls/346943.html
谈谈java agent技术的实现(内存马系列篇十二)https://www.freebuf.com/vuls/347070.html
构造agent类型的内存马(内存马系列篇十三)https://www.freebuf.com/vuls/348082.html
spring回显方式在代码层面的复现(内存马系列篇十四)https://www.freebuf.com/articles/web/348804.html
寻找全局Request进行Tomcat内存马注入(内存马系列篇十五)https://www.freebuf.com/vuls/350482.html
对上篇注入内存马方式的缩短改造(内存马篇十六)https://www.freebuf.com/vuls/350638.html
WebSphere内存马分析https://xz.aliyun.com/t/12278
GlassFish-Filter内存马分析https://xz.aliyun.com/t/12240
Jetty 内存马注入分析https://xz.aliyun.com/t/12182
Wildfly中间件内存马分析https://xz.aliyun.com/t/12161
Resin内存马分析https://xz.aliyun.com/t/12147
TemplatesImpl利用链与Fastjson注入内存马https://xz.aliyun.com/t/12085
反序列化分析到shiro注入WebSocket内存马https://xz.aliyun.com/t/12042
利用 PHP-FPM 做内存马的方法https://xz.aliyun.com/t/11651
java Filter内存马分析https://xz.aliyun.com/t/10888
Spring Interceptor 内存马分析https://xz.aliyun.com/t/11039
Java内存马:一种Tomcat全版本获取StandardContext的新方法https://xz.aliyun.com/t/9914
Resin回显及内存马https://xz.aliyun.com/t/9639
ASP.NET下的内存马(1) filter内存马https://tttang.com/archive/1408/
ASP.NET下的内存马(2) Route内存马https://tttang.com/archive/1420/
ASP.NET下的内存马(3) HttpListener内存马https://tttang.com/archive/1451/
ASP.NET下的内存马(4) VirtualPath内存马https://tttang.com/archive/1488/
NoAgent内存马检测工具https://tttang.com/archive/1390/
瞒天过海计之Tomcat隐藏内存马https://tttang.com/archive/1368/
从一个被Tomcat拒绝的漏洞到特殊内存马https://developer.aliyun.com/article/1160290
jMG - 高度自定义的 Java 内存马生成工具https://mp.weixin.qq.com/s/oAiGWY9ABhn2o148snA_sg
jMG v1.0.5介绍https://mp.weixin.qq.com/s/QjoRs_J5jVANrdEiiTtVtA
学习JAVA内存SHELLhttps://www.x1a0t.com/2020/08/04/Study-Java-Memory-Shell/
Spring Memory Shellhttps://jlkl.github.io/2022/05/26/Java-09/
Spring Memory Shellhttps://ch1e.cn/post/spring-memory-shell/
ControllerAdviceBean Memory Shellhttps://ch1e.cn/post/controlleradvicebean-memory-shell/
Executor Memory Shellhttps://ch1e.cn/post/executor-memory-shell/
Servlet Memory Shellhttps://ch1e.cn/post/servlet-memory-shell/
Java内存马之Filter内存马https://ch1e.cn/post/java-nei-cun-ma-zhi-filter-nei-cun-ma/
Executor Memory Shellhttps://cjlusec.ldxk.edu.cn/2023/02/15/Executor/
Agent内存马的自动分析与查杀https://www.cnblogs.com/slll/p/15937034.html
基于内存 Webshell 的无文件攻击技术研究https://www.anquanke.com/post/id/198886
利用 intercetor 注入 spring 内存 webshellhttps://landgrey.me/blog/19/
内存马学习专区https://github.com/Y4tacker/JavaSec#5%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0%E4%B8%93%E5%8C%BA
Tomcat Servlet-Api内存马总结及代码实现https://mp.weixin.qq.com/s/r-JHLX5UoccGNZCfJS3klg
护网专题第一篇-Java内存马(上)https://mp.weixin.qq.com/s/YVwqD6SwUq_jkEe_9afBCg
护网专题第二篇-Java内存马(下)https://mp.weixin.qq.com/s/gmKSmW5SIME8lWKj8bvhWw
Linux下无文件Java agent探究https://tttang.com/archive/1525/
浅谈 Java Agent 内存马http://wjlshare.com/archives/1582
Java Agent 内存马攻防https://www.freebuf.com/articles/web/331954.html
Java Agent 内存马https://exp10it.cn/2023/01/java-agent-%E5%86%85%E5%AD%98%E9%A9%AC/
JavaAgent内存马研究https://cangqingzhe.github.io/2021/10/13/JavaAgent%E5%86%85%E5%AD%98%E9%A9%AC%E7%A0%94%E7%A9%B6/
Java Agent内存马学习http://www.bmth666.cn/bmth_blog/2022/11/16/Java-Agent%E5%86%85%E5%AD%98%E9%A9%AC%E5%AD%A6%E4%B9%A0/
Java Agent到内存马(一)https://mp.weixin.qq.com/s?__biz=Mzg3ODg1MDUxNw==&mid=2247483687&idx=1&sn=4ce0094b03fe23bd3577c902754b99a1&chksm=cf0c399df87bb08b4a060ec91adbacd1e477fe56df200a2790fb741976abdbf078246fc6a828&scene=126&sessionid=1686886912#rd
Java Agent到内存马(二)https://mp.weixin.qq.com/s?__biz=Mzg3ODg1MDUxNw==&mid=2247483706&idx=1&sn=9440b7aaf5ee945bd79cba9e6d3efe35&chksm=cf0c3980f87bb0963ad207c5cfaea2caf13ab9130b37f2b7e5fead149f72120309a1d47a9a31&scene=126&sessionid=1686886912#rd
Java Agent到内存马https://mp.weixin.qq.com/s/4flGwH-LizMx17PK0PQEzA
Java Agent内存马演变历史https://www.ctfiot.com/58172.html
Java Agent 内存马简介https://passbya.xyz/2023/01/29/Java%20Agent%20%E5%86%85%E5%AD%98%E9%A9%AC%E7%AE%80%E4%BB%8B/
Tomcat Agent 型内存马https://paoka1.top/2023/04/24/Tomcat-Agent-%E5%9E%8B%E5%86%85%E5%AD%98%E9%A9%AC/
Java Agent 内存马https://www.viewofthai.link/2023/02/23/java-agent-%E5%86%85%E5%AD%98%E9%A9%AC/
Java Agent内存马--从入门到踩坑https://blog.z3ratu1.cn/Java%20Agent%E7%AE%80%E6%98%93%E5%85%A5%E9%97%A8.html
Java Agent内存马实现与检测https://lemono.fun/JavaAgent-MemShell/
Java Agent内存马研究学习https://blog.jd.army/2022/09/21/Java-Agent%E5%86%85%E5%AD%98%E9%A9%AC%E7%A0%94%E7%A9%B6%E5%AD%A6%E4%B9%A0/
ServletListenerFilter内存马查杀手段一https://www.freebuf.com/articles/web/369799.html
Servlet内存马利用分析https://xz.aliyun.com/t/12629
基于全局储存的新思路 | Tomcat的一种通用回显方法研究https://mp.weixin.qq.com/s?__biz=MzIwNDA2NDk5OQ==&mid=2651374294&idx=3&sn=82d050ca7268bdb7bcf7ff7ff293d7b3
Msmap内存马生成框架(一)https://hosch3n.github.io/2022/08/08/Msmap%E5%86%85%E5%AD%98%E9%A9%AC%E7%94%9F%E6%88%90%E6%A1%86%E6%9E%B6%EF%BC%88%E4%B8%80%EF%BC%89/
Msmap内存马生成框架(二)https://hosch3n.github.io/2022/08/09/Msmap%E5%86%85%E5%AD%98%E9%A9%AC%E7%94%9F%E6%88%90%E6%A1%86%E6%9E%B6%EF%BC%88%E4%BA%8C%EF%BC%89/
Msmap内存马生成框架(三)https://hosch3n.github.io/2022/10/29/Msmap%E5%86%85%E5%AD%98%E9%A9%AC%E7%94%9F%E6%88%90%E6%A1%86%E6%9E%B6%EF%BC%88%E4%B8%89%EF%BC%89/
Java安全-记一次实战使用memoryshellhttps://forum.butian.net/share/2007
Executor内存马的实现https://mp.weixin.qq.com/s/uHxQf86zHJvg9frTbjdIdA
第20篇:改造冰蝎客户端适配JNDIExploit的内存马https://mp.weixin.qq.com/s/qE_AArdpAVL-EoBbILb_Jg
深入浅出内存马https://xz.aliyun.com/t/12705
WebsocketAndTimer内存马的查杀分析和代码实现 https://www.freebuf.com/articles/web/372192.html
https://xz.aliyun.com/t/13268https://xz.aliyun.com/t/13268
https://github.com/W01fh4cker/LearnJavaMemshellFromZerohttps://github.com/W01fh4cker/LearnJavaMemshellFromZero
https://xz.aliyun.com/t/13638https://xz.aliyun.com/t/13638
https://xz.aliyun.com/t/13640https://xz.aliyun.com/t/13640
https://xz.aliyun.com/t/13639https://xz.aliyun.com/t/13639
https://github.com/topics/memshellhttps://github.com/topics/memshell
https://github.com/search?q=memshellhttps://github.com/search?q=memshell
https://github.com/pen4uin/java-memshell-generatorhttps://github.com/pen4uin/java-memshell-generator
https://github.com/hosch3n/msmaphttps://github.com/hosch3n/msmap
https://github.com/0x00007c00/JundeadShellhttps://github.com/0x00007c00/JundeadShell
https://github.com/threedr3am/ZhouYuhttps://github.com/threedr3am/ZhouYu
https://github.com/feihong-cs/memShellhttps://github.com/feihong-cs/memShell
https://github.com/jweny/MemShellDemohttps://github.com/jweny/MemShellDemo
https://github.com/achuna33/Memoryshell-JavaALLhttps://github.com/achuna33/Memoryshell-JavaALL
https://github.com/achuna33/FuckMemshellhttps://github.com/achuna33/FuckMemshell
https://github.com/BeichenDream/GodzillaMemoryShellProjecthttps://github.com/BeichenDream/GodzillaMemoryShellProject
https://github.com/ethushiroha/JavaAgentToolshttps://github.com/ethushiroha/JavaAgentTools
https://github.com/rebeyond/memShellhttps://github.com/rebeyond/memShell
https://github.com/ax1sX/MemShellhttps://github.com/ax1sX/MemShell
https://github.com/0x727/DropLabToolshttps://github.com/0x727/DropLabTools
https://github.com/su18/MemoryShellhttps://github.com/su18/MemoryShell
https://github.com/safe6Sec/MemoryShellhttps://github.com/safe6Sec/MemoryShell
https://github.com/NikolaGareth/MemoryShellhttps://github.com/NikolaGareth/MemoryShell
https://github.com/7BitsTeam/LearningAgentShellhttps://github.com/7BitsTeam/LearningAgentShell
https://github.com/gobysec/Memory-Shellhttps://github.com/gobysec/Memory-Shell
https://github.com/XhstormR/memshell-serialhttps://github.com/XhstormR/memshell-serial
https://github.com/minhangxiaohui/JAVA_memshellshttps://github.com/minhangxiaohui/JAVA_memshells
https://github.com/kuron3k0/java_memshellhttps://github.com/kuron3k0/java_memshell
https://github.com/changheluor007/MemShell-1https://github.com/changheluor007/MemShell-1
https://github.com/bmth666/memshellhttps://github.com/bmth666/memshell
https://github.com/Octoberfest7/MemFileshttps://github.com/Octoberfest7/MemFiles
https://github.com/lz2y/yaml-payload-for-ruoyihttps://github.com/lz2y/yaml-payload-for-ruoyi
https://github.com/retry-later/MemoryShell_javahttps://github.com/retry-later/MemoryShell_java
https://github.com/AzRunRCE/MemoryShellCodeExploithttps://github.com/AzRunRCE/MemoryShellCodeExploit
https://github.com/kyo-w/router-routerhttps://github.com/kyo-w/router-router
https://github.com/INT2ECALL/Awesome-JavaMemoryShellhttps://github.com/INT2ECALL/Awesome-JavaMemoryShell
https://github.com/cri1wa/MemShellhttps://github.com/cri1wa/MemShell
https://github.com/c0ny1/java-object-searcherhttps://github.com/c0ny1/java-object-searcher
https://github.com/pwntester/ysoserial.nethttps://github.com/pwntester/ysoserial.net
https://github.com/veo/vagenthttps://github.com/veo/vagent
https://github.com/rzte/agentcrackhttps://github.com/rzte/agentcrack
https://github.com/veo/ebpf_shellhttps://github.com/veo/ebpf_shell
https://github.com/veo/nginx_shellhttps://github.com/veo/nginx_shell
https://github.com/ReaJason/MemShellPartyhttps://github.com/ReaJason/MemShellParty
面向Java 的高对抗内存型Webshell 检测技术http://jcs.iie.ac.cn/xxaqxb/ch/reader/create_pdf.aspx?file_no=20220604&year_id=2022&quarter_id=6&falg=1
一种针对Tomcat Filter型的MemShell检测技术研究http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=202112210000002
https://patch-diff.githubusercontent.com/Getshell/Mshell#02-内存马原理
https://0e0w.com/Mshellhttps://0e0w.com/Mshell
https://patch-diff.githubusercontent.com/Getshell/Mshell#03-内存马实战
https://github.com/Getshell/TomShellhttps://github.com/Getshell/TomShell
https://github.com/ce-automne/TomcatMemShellhttps://github.com/ce-automne/TomcatMemShell
https://github.com/K4ys0n/TomcatMemShellDemohttps://github.com/K4ys0n/TomcatMemShellDemo
https://github.com/bitterzzZZ/MemoryShellLearnhttps://github.com/bitterzzZZ/MemoryShellLearn
https://github.com/birdhan/Memoryhttps://github.com/birdhan/Memory
https://github.com/Getshell/WeblogicShellhttps://github.com/Getshell/WeblogicShell
https://github.com/keven1z/weblogic_memshellhttps://github.com/keven1z/weblogic_memshell
https://github.com/Y4er/WebLogic-Shiro-shellhttps://github.com/Y4er/WebLogic-Shiro-shell
https://github.com/Getshell/SpringShellhttps://github.com/Getshell/SpringShell
https://github.com/passer-W/snakeyaml-memshellhttps://github.com/passer-W/snakeyaml-memshell
https://github.com/mieeA/SpringWebflux-MemShellhttps://github.com/mieeA/SpringWebflux-MemShell
https://github.com/viemsr/spring_cloud_gateway_memshellhttps://github.com/viemsr/spring_cloud_gateway_memshell
https://github.com/KpLi0rn/ShiroVulnEnvhttps://github.com/KpLi0rn/ShiroVulnEnv
https://github.com/yyhuni/shiroMemshellhttps://github.com/yyhuni/shiroMemshell
https://github.com/iceyhexman/flask_memory_shellhttps://github.com/iceyhexman/flask_memory_shell
https://github.com/crisprss/net_memory_webshellhttps://github.com/crisprss/net_memory_webshell
https://github.com/BeichenDream/GodzillaMemoryShellProject.NEThttps://github.com/BeichenDream/GodzillaMemoryShellProject.NET
https://github.com/veo/wsMemShellhttps://github.com/veo/wsMemShell
https://www.freebuf.com/articles/web/339702.htmlhttps://www.freebuf.com/articles/web/339702.html
https://paper.seebug.org/1935https://paper.seebug.org/1935
Tomcat WebSocket内存马原理浅析https://tttang.com/archive/1673/
https://www.cnblogs.com/duanxz/p/5041110.htmlhttps://www.cnblogs.com/duanxz/p/5041110.html
WebSocket通信原理和在Tomcat中实现源码详解https://blog.csdn.net/weixin_36586120/article/details/120025498
websocket新型内存马的应急响应https://mp.weixin.qq.com/s/T3UfA1plrlG-e9lgfB4whg
内存马的攻防博弈之旅之GRPC内存马http://blog.nsfocus.net/grpc/
https://github.com/snailll/gRPCDemohttps://github.com/snailll/gRPCDemo
gRPC内存马研究与查杀https://xz.aliyun.com/t/11985
Shiro反序列化注入内存马https://ch1e.cn/post/shiro-fan-xu-lie-hua-zhu-ru-nei-cun-ma/
Fastjson反序列化注入内存马https://ch1e.cn/post/fastjson-fan-xu-lie-hua-zhu-ru-nei-cun-ma/
https://github.com/whwlsfb/cve-2022-22947-godzilla-memshellhttps://github.com/whwlsfb/cve-2022-22947-godzilla-memshell
https://github.com/A-D-Team/SharpMemshellhttps://github.com/A-D-Team/SharpMemshell
https://github.com/threedr3am/JSP-WebShellshttps://github.com/threedr3am/JSP-WebShells
https://github.com/Boogipop/Netty-WebFlux-Memshellhttps://github.com/Boogipop/Netty-WebFlux-Memshell
https://patch-diff.githubusercontent.com/Getshell/Mshell#04-内存马查杀
给木马带双眼睛https://xz.aliyun.com/t/11655
查杀Java web filter型内存马https://gv7.me/articles/2020/kill-java-web-filter-memshell/
https://github.com/geekmc/FindShellhttps://github.com/geekmc/FindShell
https://github.com/4ra1n/shell-analyzerhttps://github.com/4ra1n/shell-analyzer
https://github.com/c0ny1/java-memshell-scannerhttps://github.com/c0ny1/java-memshell-scanner
https://github.com/LandGrey/copagenthttps://github.com/LandGrey/copagent
https://github.com/alibaba/arthashttps://github.com/alibaba/arthas
https://github.com/sf197/MemoryShellHunterhttps://github.com/sf197/MemoryShellHunter
https://github.com/cri1wa/DefendMemoryShellhttps://github.com/cri1wa/DefendMemoryShell
https://github.com/tovd-go/java-memshell-scanhttps://github.com/tovd-go/java-memshell-scan
https://github.com/huoji120/DuckMemoryScanhttps://github.com/huoji120/DuckMemoryScan
https://github.com/threedr3am/GuanYuhttps://github.com/threedr3am/GuanYu
https://mp.weixin.qq.com/s/y6qEtfhdA8Udmvxuh7H12Qhttps://mp.weixin.qq.com/s/y6qEtfhdA8Udmvxuh7H12Q
https://patch-diff.githubusercontent.com/Getshell/Mshell#05-内存马参考
https://github.com/pen4uinhttps://github.com/pen4uin
https://github.com/threedr3amhttps://github.com/threedr3am
https://github.com/Getshell/Webshellhttps://github.com/Getshell/Webshell
https://github.com/HackJava/HackJavahttps://github.com/HackJava/HackJava
https://github.com/HackJava/JNDIhttps://github.com/HackJava/JNDI
https://github.com/HackJava/jspshellhttps://github.com/HackJava/jspshell
https://github.com/RoboTerhhttps://github.com/RoboTerh
https://starchart.cc/Getshell/Mshell
https://patch-diff.githubusercontent.com/Getshell/Mshell/blob/main/01-%E5%86%85%E5%AD%98%E9%A9%AC%E8%B5%84%E6%BA%90/wx.png
getshell https://patch-diff.githubusercontent.com/topics/getshell
memshell https://patch-diff.githubusercontent.com/topics/memshell
0e0w https://patch-diff.githubusercontent.com/topics/0e0w
mshell https://patch-diff.githubusercontent.com/topics/mshell
memoryshell https://patch-diff.githubusercontent.com/topics/memoryshell
Readme https://patch-diff.githubusercontent.com/Getshell/Mshell#readme-ov-file
Please reload this pagehttps://patch-diff.githubusercontent.com/Getshell/Mshell
Activityhttps://patch-diff.githubusercontent.com/Getshell/Mshell/activity
Custom propertieshttps://patch-diff.githubusercontent.com/Getshell/Mshell/custom-properties
931 starshttps://patch-diff.githubusercontent.com/Getshell/Mshell/stargazers
11 watchinghttps://patch-diff.githubusercontent.com/Getshell/Mshell/watchers
112 forkshttps://patch-diff.githubusercontent.com/Getshell/Mshell/forks
Report repository https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2FGetshell%2FMshell&report=Getshell+%28user%29
Releaseshttps://patch-diff.githubusercontent.com/Getshell/Mshell/releases
Packages 0https://patch-diff.githubusercontent.com/orgs/Getshell/packages?repo_name=Mshell
Please reload this pagehttps://patch-diff.githubusercontent.com/Getshell/Mshell
Java 100.0% https://patch-diff.githubusercontent.com/Getshell/Mshell/search?l=java
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.