GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Explore CVE-2021-44228, a vulnerability in log4j affecting almost all software under the sun.
URL:https://github.com/Bhagwatjadhav1997/tryhackme-Solar-exploiting-log4j
更新了:CVE-2021
描述:Explore CVE-2021-44228, a vulnerability in log4j affecting almost all software under the sun.
URL:https://github.com/Bhagwatjadhav1997/tryhackme-Solar-exploiting-log4j
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Discover Log4Shell vulnerability [CVE-2021-45105]
URL:https://github.com/name/log4j
更新了:CVE-2021
描述:Discover Log4Shell vulnerability [CVE-2021-45105]
URL:https://github.com/name/log4j
GitHub
GitHub - name/log4j: Discover Log4Shell vulnerability [CVE-2021-44832]
Discover Log4Shell vulnerability [CVE-2021-44832]. Contribute to name/log4j development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Script to create a log4j (CVE-2021-44228) exploit with support for different methods of getting a reverse shell
URL:https://github.com/a5tra/log4j-exploit-builder
更新了:CVE-2021
描述:Script to create a log4j (CVE-2021-44228) exploit with support for different methods of getting a reverse shell
URL:https://github.com/a5tra/log4j-exploit-builder
GitHub
GitHub - a5tra/log4j-exploit-builder: Script to create a log4j (CVE-2021-44228) exploit with support for different methods of getting…
Script to create a log4j (CVE-2021-44228) exploit with support for different methods of getting a reverse shell - GitHub - a5tra/log4j-exploit-builder: Script to create a log4j (CVE-2021-44228) exp...
👍1
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-3707 , CVE-2021-3708
URL:https://github.com/HadiMed/firmware-analysis
更新了:CVE-2021
描述:CVE-2021-3707 , CVE-2021-3708
URL:https://github.com/HadiMed/firmware-analysis
GitHub
GitHub - HadiMed/DSL-2750U-Full-chain: CVE-2021-3707 , CVE-2021-3708
CVE-2021-3707 , CVE-2021-3708. Contribute to HadiMed/DSL-2750U-Full-chain development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Red Team in Cybersecurity.
URL:https://github.com/paulveillard/cybersecurity-red-team
更新了:Red Team
描述:A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Red Team in Cybersecurity.
URL:https://github.com/paulveillard/cybersecurity-red-team
GitHub
GitHub - paulveillard/cybersecurity-red-team: An ongoing & curated collection of awesome software best practices and techniques…
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technica...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Active Directory Red Team Tools
URL:https://github.com/nobelh/ActiveDirectory
更新了:Red Team
描述:Active Directory Red Team Tools
URL:https://github.com/nobelh/ActiveDirectory
GitHub
GitHub - nobelh/ActiveDirectory: Active Directory Red Team Tools
Active Directory Red Team Tools. Contribute to nobelh/ActiveDirectory development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Section Mapping Process Injection (secinject): Cobalt Strike BOF
URL:https://github.com/apokryptein/secinject
更新了:Cobalt Strike
描述:Section Mapping Process Injection (secinject): Cobalt Strike BOF
URL:https://github.com/apokryptein/secinject
GitHub
GitHub - apokryptein/secinject: Section Mapping Process Injection (secinject): Cobalt Strike BOF
Section Mapping Process Injection (secinject): Cobalt Strike BOF - apokryptein/secinject
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Presents how to exploit CVE-2021-44228 vulnerability.
URL:https://github.com/MarceloLeite2604/log4j-vulnerability
更新了:CVE-2021
描述:Presents how to exploit CVE-2021-44228 vulnerability.
URL:https://github.com/MarceloLeite2604/log4j-vulnerability
GitHub
GitHub - MarceloLeite2604/log4j-vulnerability: Presents how to exploit CVE-2021-44228 vulnerability.
Presents how to exploit CVE-2021-44228 vulnerability. - GitHub - MarceloLeite2604/log4j-vulnerability: Presents how to exploit CVE-2021-44228 vulnerability.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Gex is an iOS 14.7 jailbreak using CVE-2021-30807 IOMFB exploit
URL:https://github.com/30440r/gex
更新了:CVE-2021
描述:Gex is an iOS 14.7 jailbreak using CVE-2021-30807 IOMFB exploit
URL:https://github.com/30440r/gex
GitHub
GitHub - 30440r/gex: Gex is an iOS 14.7 jailbreak using CVE-2021-30807 IOMFB & CVE-2021-30860 exploit(s)
Gex is an iOS 14.7 jailbreak using CVE-2021-30807 IOMFB & CVE-2021-30860 exploit(s) - 30440r/gex
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.
URL:https://github.com/boku7/BokuLoader
更新了:Cobalt Strike
描述:Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.
URL:https://github.com/boku7/BokuLoader
GitHub
GitHub - boku7/BokuLoader: A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt…
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! - boku7/BokuLoader
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包括满补丁系统上的稳定利用.
URL:https://github.com/cbwang505/poolfengshui
更新了:漏洞利用
描述:笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包括满补丁系统上的稳定利用.
URL:https://github.com/cbwang505/poolfengshui
GitHub
GitHub - cbwang505/poolfengshui: 笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工…
笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包括满补丁系统上的稳定利用. - cbwang505/poolfengshui
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as Log4Shell.
URL:https://github.com/romanutti/log4shell-vulnerable-app
更新了:CVE-2021
描述:This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as Log4Shell.
URL:https://github.com/romanutti/log4shell-vulnerable-app
GitHub
GitHub - romanutti/log4shell-vulnerable-app: This repository contains a Spring Boot web application vulnerable to CVE-2021-44228…
This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as log4shell. - GitHub - romanutti/log4shell-vulnerable-app: This repository contains a Spring Boot web ap...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)
URL:https://github.com/Nate0634034090/nate158g-m-w-n-l-p-d-a-o-e
更新了:CVE-2021
描述:log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)
URL:https://github.com/Nate0634034090/nate158g-m-w-n-l-p-d-a-o-e
GitHub
GitHub - Nate0634034090/nate158g-m-w-n-l-p-d-a-o-e: ### This module requires Metasploit: https://metasploit.com/download# Current…
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote Rank = No...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A sample POC to test CVE-2021-30853
URL:https://github.com/shubham0d/CVE-2021-30853
更新了:CVE-2021
描述:A sample POC to test CVE-2021-30853
URL:https://github.com/shubham0d/CVE-2021-30853
GitHub
GitHub - shubham0d/CVE-2021-30853: A sample POC to test CVE-2021-30853
A sample POC to test CVE-2021-30853. Contribute to shubham0d/CVE-2021-30853 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-3156 - Sudo Baron Samedit
URL:https://github.com/LiveOverflow/pwnedit
更新了:CVE-2021
描述:CVE-2021-3156 - Sudo Baron Samedit
URL:https://github.com/LiveOverflow/pwnedit
GitHub
GitHub - LiveOverflow/pwnedit: CVE-2021-3156 - Sudo Baron Samedit
CVE-2021-3156 - Sudo Baron Samedit. Contribute to LiveOverflow/pwnedit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A collection of Cobalt Strike Aggressor scripts.
URL:https://github.com/Peco602/cobaltstrike-aggressor-scripts
更新了:Cobalt Strike
描述:A collection of Cobalt Strike Aggressor scripts.
URL:https://github.com/Peco602/cobaltstrike-aggressor-scripts
GitHub
GitHub - Peco602/cobaltstrike-aggressor-scripts: A collection of Cobalt Strike Aggressor scripts.
A collection of Cobalt Strike Aggressor scripts. Contribute to Peco602/cobaltstrike-aggressor-scripts development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Log4J CVE-2021-44228 : Mitigation Cheat Sheet
URL:https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
更新了:CVE-2021
描述:Log4J CVE-2021-44228 : Mitigation Cheat Sheet
URL:https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
GitHub
GitHub - thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832: Log4J CVE-2021-44228…
Log4J CVE-2021-44228 : Mitigation Cheat Sheet. Contribute to thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832 development by creating an account on Gi...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:POC for CVE-2021-22214: Gitlab SSRF
URL:https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214
更新了:CVE-2021
描述:POC for CVE-2021-22214: Gitlab SSRF
URL:https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214
GitHub
GitHub - kh4sh3i/GitLab-SSRF-CVE-2021-22214: POC for CVE-2021-22214: Gitlab SSRF
POC for CVE-2021-22214: Gitlab SSRF. Contribute to kh4sh3i/GitLab-SSRF-CVE-2021-22214 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化
URL:https://github.com/crisprss/BypassUserAdd
更新了:Cobalt Strike
描述:通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化
URL:https://github.com/crisprss/BypassUserAdd
GitHub
GitHub - crisprss/BypassUserAdd: 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化
通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化 - crisprss/BypassUserAdd