GitHub监控消息提醒!!!
更新了:RCE
描述:A virus that allows you to perform RCE without a central C&C server. Inspired by https://web.archive.org/web/20240630111816/https://pato.pw/SilentFileserver.html
URL:https://github.com/Planetaryauto60/Reverse_C-C
标签:#RCE
更新了:RCE
描述:A virus that allows you to perform RCE without a central C&C server. Inspired by https://web.archive.org/web/20240630111816/https://pato.pw/SilentFileserver.html
URL:https://github.com/Planetaryauto60/Reverse_C-C
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Reproducer for CVE-2025-22620
URL:https://github.com/EliahKagan/checkout-index
标签:#CVE-2025
更新了:CVE-2025
描述:Reproducer for CVE-2025-22620
URL:https://github.com/EliahKagan/checkout-index
标签:#CVE-2025
GitHub
GitHub - EliahKagan/checkout-index: Reproducer for CVE-2025-22620
Reproducer for CVE-2025-22620. Contribute to EliahKagan/checkout-index development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:`EmergencyTookit `是一款专为Windows系统设计的应急响应解决方案,旨在帮助用户在面对系统安全事件、故障排查等紧急情况时,能够迅速、高效地收集关键信息、定位问题根源并采取相应措施。它集合了市面上轻量且优秀的工具,经过精心挑选和优化,以满足应急响应过程中对速度和准确性的严格要求。
URL:https://github.com/XcNgg/EmergencyTookit
标签:#应急响应
更新了:应急响应
描述:`EmergencyTookit `是一款专为Windows系统设计的应急响应解决方案,旨在帮助用户在面对系统安全事件、故障排查等紧急情况时,能够迅速、高效地收集关键信息、定位问题根源并采取相应措施。它集合了市面上轻量且优秀的工具,经过精心挑选和优化,以满足应急响应过程中对速度和准确性的严格要求。
URL:https://github.com/XcNgg/EmergencyTookit
标签:#应急响应
GitHub
GitHub - XcNgg/EmergencyTookit: `EmergencyTookit `是一款专为Windows系统设计的应急响应解决方案,旨在帮助用户在面对系统安全事件、故障排查等紧急情况时,能够迅速、高效地收集关键信息、定位问题根源并采…
`EmergencyTookit `是一款专为Windows系统设计的应急响应解决方案,旨在帮助用户在面对系统安全事件、故障排查等紧急情况时,能够迅速、高效地收集关键信息、定位问题根源并采取相应措施。它集合了市面上轻量且优秀的工具,经过精心挑选和优化,以满足应急响应过程中对速度和准确性的严格要求。 - XcNgg/EmergencyTookit
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887.
URL:https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser
标签:#CVE-2025
更新了:CVE-2025
描述:A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887.
URL:https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser
标签:#CVE-2025
GitHub
GitHub - Hexastrike/Ivanti-Connect-Secure-Logs-Parser: A Python script for examining Ivanti Secure Connect (ICS) event logs, designed…
A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887. - Hexastrike/Ivanti-...
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:闭源系统半自动漏洞挖掘工具,针对 jar/war/zip 进行静态代码分析,输出从source到sink的可达路径。LLM将验证路径可达性,并根据上下文给出该路径可信分数
URL:https://github.com/TheKingOfDuck/SinkFinder
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:闭源系统半自动漏洞挖掘工具,针对 jar/war/zip 进行静态代码分析,输出从source到sink的可达路径。LLM将验证路径可达性,并根据上下文给出该路径可信分数
URL:https://github.com/TheKingOfDuck/SinkFinder
标签:#漏洞挖掘
GitHub
GitHub - TheKingOfDuck/SinkFinder: 闭源系统半自动漏洞挖掘工具,针对 jar/war/zip 进行静态代码分析,输出从source到sink的可达路径。LLM将验证路径可达性,并根据上下文给出该路径可信分数
闭源系统半自动漏洞挖掘工具,针对 jar/war/zip 进行静态代码分析,输出从source到sink的可达路径。LLM将验证路径可达性,并根据上下文给出该路径可信分数 - TheKingOfDuck/SinkFinder
GitHub监控消息提醒!!!
更新了:信息收集
描述:AutoPen是一款功能强大的自动化渗透测试工具,专为安全研究人员、渗透测试工程师和网络安全爱好者设计。它集成了多种高级安全测试功能,能够自动化完成信息收集、漏洞扫描、安全评估等任务,帮助用户快速发现目标系统中的潜在安全隐患。
URL:https://github.com/pattonant/autopen
标签:#信息收集
更新了:信息收集
描述:AutoPen是一款功能强大的自动化渗透测试工具,专为安全研究人员、渗透测试工程师和网络安全爱好者设计。它集成了多种高级安全测试功能,能够自动化完成信息收集、漏洞扫描、安全评估等任务,帮助用户快速发现目标系统中的潜在安全隐患。
URL:https://github.com/pattonant/autopen
标签:#信息收集
GitHub监控消息提醒!!!
更新了:RCE
描述:This is a Chained RCE in the Havoc C2 framework using github.com/chebuya and github.com/IncludeSecurity pocs
URL:https://github.com/thisisveryfunny/Havoc-C2-RCE
标签:#RCE
更新了:RCE
描述:This is a Chained RCE in the Havoc C2 framework using github.com/chebuya and github.com/IncludeSecurity pocs
URL:https://github.com/thisisveryfunny/Havoc-C2-RCE
标签:#RCE
GitHub
chebuya - Overview
chebuya has 8 repositories available. Follow their code on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A Tool that combines two Havoc CVEs in order to obtain RCE on a havoc C2 server through an SSRF.
URL:https://github.com/Mesumine/Havoc-Hackback
标签:#RCE
更新了:RCE
描述:A Tool that combines two Havoc CVEs in order to obtain RCE on a havoc C2 server through an SSRF.
URL:https://github.com/Mesumine/Havoc-Hackback
标签:#RCE
GitHub
GitHub - Mesumine/Havoc-Hackback: A Tool that combines two Havoc CVEs in order to obtain RCE on a havoc C2 server through an SSRF.
A Tool that combines two Havoc CVEs in order to obtain RCE on a havoc C2 server through an SSRF. - Mesumine/Havoc-Hackback
GitHub监控消息提醒!!!
更新了:RCE
描述:Havoc C2 Teamserver SSRF-RCE chain exploit
URL:https://github.com/EndermanSUPREME/Havoc-C2-SSRF-to-RCE-POC
标签:#RCE
更新了:RCE
描述:Havoc C2 Teamserver SSRF-RCE chain exploit
URL:https://github.com/EndermanSUPREME/Havoc-C2-SSRF-to-RCE-POC
标签:#RCE
GitHub
GitHub - EndermanSUPREME/Havoc-C2-SSRF-to-RCE-POC: Havoc C2 Teamserver SSRF-RCE chain exploit
Havoc C2 Teamserver SSRF-RCE chain exploit. Contribute to EndermanSUPREME/Havoc-C2-SSRF-to-RCE-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This POC chains CVE-2024-41570 and RCE in Havoc C2
URL:https://github.com/Doc-Grinch/Havoc-CVE-2024-41570-and-RCE
标签:#RCE
更新了:RCE
描述:This POC chains CVE-2024-41570 and RCE in Havoc C2
URL:https://github.com/Doc-Grinch/Havoc-CVE-2024-41570-and-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:burp
描述:A repo containing burp suite progress, including screenshots in lab.
URL:https://github.com/steeleaim/Burp-suite-Cyber-security-labs-Apprentice-
标签:#burp
更新了:burp
描述:A repo containing burp suite progress, including screenshots in lab.
URL:https://github.com/steeleaim/Burp-suite-Cyber-security-labs-Apprentice-
标签:#burp
GitHub
GitHub - steeleaim/Burp-suite-Cyber-security-labs-Apprentice-: A repo containing burp suite progress, including screenshots in…
A repo containing burp suite progress, including screenshots in lab. - steeleaim/Burp-suite-Cyber-security-labs-Apprentice-
GitHub监控消息提醒!!!
更新了:Red Team
描述:Enterprise-Grade Web3 Red Team Tool for simulating attacks, deploying malicious contracts, and executing flash loan attacks.
URL:https://github.com/primooo234/web3-red-team-tool
标签:#Red Team
更新了:Red Team
描述:Enterprise-Grade Web3 Red Team Tool for simulating attacks, deploying malicious contracts, and executing flash loan attacks.
URL:https://github.com/primooo234/web3-red-team-tool
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of concept & details for CVE-2025-21298
URL:https://github.com/ynwarcs/CVE-2025-21298
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of concept & details for CVE-2025-21298
URL:https://github.com/ynwarcs/CVE-2025-21298
标签:#CVE-2025
GitHub
GitHub - ynwarcs/CVE-2025-21298: Proof of concept & details for CVE-2025-21298
Proof of concept & details for CVE-2025-21298. Contribute to ynwarcs/CVE-2025-21298 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:根据名字列表生成用户名,用于渗透测试。
URL:https://github.com/7r1UMPH/usernamedeformer
标签:#渗透测试
更新了:渗透测试
描述:根据名字列表生成用户名,用于渗透测试。
URL:https://github.com/7r1UMPH/usernamedeformer
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:RCE
描述:Ferramenta para encontrar vulnerabilidade de RCE
URL:https://github.com/Freitaszkb/BloodHost3r
标签:#RCE
更新了:RCE
描述:Ferramenta para encontrar vulnerabilidade de RCE
URL:https://github.com/Freitaszkb/BloodHost3r
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/sebr-dev/Havoc-C2-SSRF-to-RCE
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/sebr-dev/Havoc-C2-SSRF-to-RCE
标签:#RCE
GitHub
GitHub - sebr-dev/Havoc-C2-SSRF-to-RCE: This is a modified version of the CVE-2024-41570 SSRF PoC from @chebuya chained with the…
This is a modified version of the CVE-2024-41570 SSRF PoC from @chebuya chained with the auth RCE exploit from @hyperreality. This exploit executes code remotely to a target due to multiple vulnera...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE
URL:https://github.com/kit4py/CVE-2024-41570
标签:#RCE
更新了:RCE
描述:Automated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE
URL:https://github.com/kit4py/CVE-2024-41570
标签:#RCE
GitHub
GitHub - kit4py/CVE-2024-41570: Automated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE
Automated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE - kit4py/CVE-2024-41570
GitHub监控消息提醒!!!
更新了:RCE
描述:Automated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE
URL:https://github.com/jamimma/RCEE
标签:#RCE
更新了:RCE
描述:Automated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE
URL:https://github.com/jamimma/RCEE
标签:#RCE
GitHub
GitHub - jamimma/RCEE: This project is a complete redesign of the official website for Ramchandra College of Engineering (RCCE).…
This project is a complete redesign of the official website for Ramchandra College of Engineering (RCCE). It showcases a modern, responsive, and user-friendly interface designed to enhance the user...
GitHub监控消息提醒!!!
更新了:RCE
描述:Check Point Security Gateways RCE via CVE-2021-40438
URL:https://github.com/element-security/check-point-gateways-rce
标签:#RCE
更新了:RCE
描述:Check Point Security Gateways RCE via CVE-2021-40438
URL:https://github.com/element-security/check-point-gateways-rce
标签:#RCE