GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.
URL:https://github.com/boku7/BokuLoader
更新了:Cobalt Strike
描述:Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.
URL:https://github.com/boku7/BokuLoader
GitHub
GitHub - boku7/BokuLoader: A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt…
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! - boku7/BokuLoader
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包括满补丁系统上的稳定利用.
URL:https://github.com/cbwang505/poolfengshui
更新了:漏洞利用
描述:笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包括满补丁系统上的稳定利用.
URL:https://github.com/cbwang505/poolfengshui
GitHub
GitHub - cbwang505/poolfengshui: 笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工…
笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包括满补丁系统上的稳定利用. - cbwang505/poolfengshui
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as Log4Shell.
URL:https://github.com/romanutti/log4shell-vulnerable-app
更新了:CVE-2021
描述:This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as Log4Shell.
URL:https://github.com/romanutti/log4shell-vulnerable-app
GitHub
GitHub - romanutti/log4shell-vulnerable-app: This repository contains a Spring Boot web application vulnerable to CVE-2021-44228…
This repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as log4shell. - GitHub - romanutti/log4shell-vulnerable-app: This repository contains a Spring Boot web ap...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)
URL:https://github.com/Nate0634034090/nate158g-m-w-n-l-p-d-a-o-e
更新了:CVE-2021
描述:log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)
URL:https://github.com/Nate0634034090/nate158g-m-w-n-l-p-d-a-o-e
GitHub
GitHub - Nate0634034090/nate158g-m-w-n-l-p-d-a-o-e: ### This module requires Metasploit: https://metasploit.com/download# Current…
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote Rank = No...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A sample POC to test CVE-2021-30853
URL:https://github.com/shubham0d/CVE-2021-30853
更新了:CVE-2021
描述:A sample POC to test CVE-2021-30853
URL:https://github.com/shubham0d/CVE-2021-30853
GitHub
GitHub - shubham0d/CVE-2021-30853: A sample POC to test CVE-2021-30853
A sample POC to test CVE-2021-30853. Contribute to shubham0d/CVE-2021-30853 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-3156 - Sudo Baron Samedit
URL:https://github.com/LiveOverflow/pwnedit
更新了:CVE-2021
描述:CVE-2021-3156 - Sudo Baron Samedit
URL:https://github.com/LiveOverflow/pwnedit
GitHub
GitHub - LiveOverflow/pwnedit: CVE-2021-3156 - Sudo Baron Samedit
CVE-2021-3156 - Sudo Baron Samedit. Contribute to LiveOverflow/pwnedit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A collection of Cobalt Strike Aggressor scripts.
URL:https://github.com/Peco602/cobaltstrike-aggressor-scripts
更新了:Cobalt Strike
描述:A collection of Cobalt Strike Aggressor scripts.
URL:https://github.com/Peco602/cobaltstrike-aggressor-scripts
GitHub
GitHub - Peco602/cobaltstrike-aggressor-scripts: A collection of Cobalt Strike Aggressor scripts.
A collection of Cobalt Strike Aggressor scripts. Contribute to Peco602/cobaltstrike-aggressor-scripts development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Log4J CVE-2021-44228 : Mitigation Cheat Sheet
URL:https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
更新了:CVE-2021
描述:Log4J CVE-2021-44228 : Mitigation Cheat Sheet
URL:https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
GitHub
GitHub - thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832: Log4J CVE-2021-44228…
Log4J CVE-2021-44228 : Mitigation Cheat Sheet. Contribute to thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832 development by creating an account on Gi...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:POC for CVE-2021-22214: Gitlab SSRF
URL:https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214
更新了:CVE-2021
描述:POC for CVE-2021-22214: Gitlab SSRF
URL:https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214
GitHub
GitHub - kh4sh3i/GitLab-SSRF-CVE-2021-22214: POC for CVE-2021-22214: Gitlab SSRF
POC for CVE-2021-22214: Gitlab SSRF. Contribute to kh4sh3i/GitLab-SSRF-CVE-2021-22214 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化
URL:https://github.com/crisprss/BypassUserAdd
更新了:Cobalt Strike
描述:通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化
URL:https://github.com/crisprss/BypassUserAdd
GitHub
GitHub - crisprss/BypassUserAdd: 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化
通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化 - crisprss/BypassUserAdd
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List
URL:https://github.com/beauwoods/4jfinder
更新了:CVE-2021
描述:Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List
URL:https://github.com/beauwoods/4jfinder
GitHub
GitHub - 4jfinder/4jfinder.github.io: Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List
Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List - GitHub - 4jfinder/4jfinder.github.io: Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor &...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List
URL:https://github.com/4jfinder/4jfinder.github.io
更新了:CVE-2021
描述:Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List
URL:https://github.com/4jfinder/4jfinder.github.io
GitHub
GitHub - 4jfinder/4jfinder.github.io: Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List
Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List - GitHub - 4jfinder/4jfinder.github.io: Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor &...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-45232-RCE-多线程批量漏洞检测
URL:https://github.com/GYLQ/CVE-2021-45232-RCE
更新了:CVE-2021
描述:CVE-2021-45232-RCE-多线程批量漏洞检测
URL:https://github.com/GYLQ/CVE-2021-45232-RCE
GitHub
GitHub - GYLQ/CVE-2021-45232-RCE: CVE-2021-45232-RCE-多线程批量漏洞检测
CVE-2021-45232-RCE-多线程批量漏洞检测. Contribute to GYLQ/CVE-2021-45232-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
URL:https://github.com/alanballard/Training-Intelligent-Red-Team-Agents-Via-Deep-Reinforcement-Learning
更新了:Red Team
描述:Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
URL:https://github.com/alanballard/Training-Intelligent-Red-Team-Agents-Via-Deep-Reinforcement-Learning
GitHub
GitHub - alanballard/Training-Intelligent-Red-Team-Agents-Via-Deep-Reinforcement-Learning: Code for executing simulations used…
Code for executing simulations used in the "Training Intelligent Red Team Agents Via Deep Reinforcement Learning" project - GitHub - alanballard/Training-Intelligent-Red-Team-Agen...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A vulnerable web app for log4j2 RCE(CVE-2021-44228) exploit test.
URL:https://github.com/kanitan/log4j2-web-vulnerable
更新了:CVE-2021
描述:A vulnerable web app for log4j2 RCE(CVE-2021-44228) exploit test.
URL:https://github.com/kanitan/log4j2-web-vulnerable
GitHub
GitHub - kanitan/log4j2-web-vulnerable: A vulnerable web app for log4j2 RCE(CVE-2021-44228) exploit test.
A vulnerable web app for log4j2 RCE(CVE-2021-44228) exploit test. - GitHub - kanitan/log4j2-web-vulnerable: A vulnerable web app for log4j2 RCE(CVE-2021-44228) exploit test.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
URL:https://github.com/jaredalanis/Red-vs-Blue
更新了:Red Team
描述:Code for executing simulations used in the \"Training Intelligent Red Team Agents Via Deep Reinforcement Learning\" project
URL:https://github.com/jaredalanis/Red-vs-Blue
GitHub
GitHub - jaredalanis/Red-vs-Blue: In this project, I will work on a Red Team vs. Blue Team scenario in which I will play the role…
In this project, I will work on a Red Team vs. Blue Team scenario in which I will play the role of both pentester and SOC analyst. As the Red Team, I will attack a vulnerable VM within my environme...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Probably the easiest way to setup new beacon notifications in Cobalt Strike
URL:https://github.com/CodeXTF2/beacon_notify_discordhook
更新了:Cobalt Strike
描述:Probably the easiest way to setup new beacon notifications in Cobalt Strike
URL:https://github.com/CodeXTF2/beacon_notify_discordhook
GitHub
GitHub - CodeXTF2/beacon_notify_discordhook: Probably the easiest way to setup new beacon notifications in Cobalt Strike
Probably the easiest way to setup new beacon notifications in Cobalt Strike - GitHub - CodeXTF2/beacon_notify_discordhook: Probably the easiest way to setup new beacon notifications in Cobalt Strike
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Details,PoC and patches for CVE-2021-45383 & CVE-2021-45384
URL:https://github.com/nt1dr/CVE-2021-45383
更新了:CVE-2021
描述:Details,PoC and patches for CVE-2021-45383 & CVE-2021-45384
URL:https://github.com/nt1dr/CVE-2021-45383
GitHub
GitHub - nt1dr/CVE-2021-45383: Details,PoC and patches for CVE-2021-45383 & CVE-2021-45384
Details,PoC and patches for CVE-2021-45383 & CVE-2021-45384 - GitHub - nt1dr/CVE-2021-45383: Details,PoC and patches for CVE-2021-45383 & CVE-2021-45384