GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-46080 - A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability.
URL:https://github.com/plsanu/CVE-2021-46080
更新了:CVE-2021
描述:CVE-2021-46080 - A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability.
URL:https://github.com/plsanu/CVE-2021-46080
GitHub
GitHub - plsanu/CVE-2021-46080: CVE-2021-46080 - A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management…
CVE-2021-46080 - A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability. - ...
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:本项目并不刻意搜集 POC 或 EXP,包含但不限于漏洞资讯、漏洞复现、漏洞分析、漏洞验证、漏洞利用
URL:https://github.com/binganao/vulns-2022
更新了:漏洞利用
描述:本项目并不刻意搜集 POC 或 EXP,包含但不限于漏洞资讯、漏洞复现、漏洞分析、漏洞验证、漏洞利用
URL:https://github.com/binganao/vulns-2022
GitHub
GitHub - binganao/vulns-2022: 本项目用于搜集 2022 年的漏洞,注意:本项目并不刻意搜集 POC 或 EXP,主要以CVE-2021、CVE-2022 为关键词,包含但不限于漏洞资讯、漏洞复现、漏洞分析、漏洞验证、漏洞利用
本项目用于搜集 2022 年的漏洞,注意:本项目并不刻意搜集 POC 或 EXP,主要以CVE-2021、CVE-2022 为关键词,包含但不限于漏洞资讯、漏洞复现、漏洞分析、漏洞验证、漏洞利用 - GitHub - binganao/vulns-2022: 本项目用于搜集 2022 年的漏洞,注意:本项目并不刻意搜集 POC 或 EXP,主要以CVE-2021、CVE-2022 为关键词,...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Alias identity manager for Red Teams, OSINT collectors, journalists, and privacy-conscious people
URL:https://github.com/mattreduce/sockdrawer
更新了:Red Team
描述:Alias identity manager for Red Teams, OSINT collectors, journalists, and privacy-conscious people
URL:https://github.com/mattreduce/sockdrawer
GitHub
GitHub - srcmtd/sockdrawer: Alias identity manager for Red Teams, OSINT collectors, journalists, and privacy-conscious people
Alias identity manager for Red Teams, OSINT collectors, journalists, and privacy-conscious people - srcmtd/sockdrawer
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-46067 - In Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover.
URL:https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Cookie-Stealing-Leads-to-Full-Account-Takeover
更新了:CVE-2021
描述:CVE-2021-46067 - In Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover.
URL:https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-Cookie-Stealing-Leads-to-Full-Account-Takeover
GitHub
GitHub - plsanu/Vehicle-Service-Management-System-Multiple-Cookie-Stealing-Leads-to-Full-Account-Takeover: CVE-2021-46067 - In…
CVE-2021-46067 - In Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover. - GitHub - plsanu/Vehicle-Service-Management-System-Multiple-Cookie-Ste...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Flexible C2 framework for Nation State Simulations in Red Team Assessments.
URL:https://github.com/aidden-laoch/sabre
更新了:Red Team
描述:Flexible C2 framework for Nation State Simulations in Red Team Assessments.
URL:https://github.com/aidden-laoch/sabre
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/HuskyHacks/ShadowSteal
更新了:CVE-2021
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/HuskyHacks/ShadowSteal
GitHub
GitHub - HuskyHacks/ShadowSteal: Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation - HuskyHacks/ShadowSteal
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM
URL:https://github.com/australeo/CVE-2021-28476
更新了:CVE-2021
描述:CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM
URL:https://github.com/australeo/CVE-2021-28476
GitHub
GitHub - australeo/CVE-2021-28476: CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM
CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM - australeo/CVE-2021-28476
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:An exploit/PoC for CVE-2021-42237
URL:https://github.com/PinkDev1/CVE-2021-42237
更新了:CVE-2021
描述:An exploit/PoC for CVE-2021-42237
URL:https://github.com/PinkDev1/CVE-2021-42237
GitHub
GitHub - ItsIgnacioPortal/CVE-2021-42237: An exploit/PoC for CVE-2021-42237
An exploit/PoC for CVE-2021-42237. Contribute to ItsIgnacioPortal/CVE-2021-42237 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内网渗透
描述:整理渗透测试、内网渗透、爆破字典、漏洞库、代码审计、渗透测试面试题相关项目
URL:https://github.com/j2ekim/Pentest_Project
更新了:内网渗透
描述:整理渗透测试、内网渗透、爆破字典、漏洞库、代码审计、渗透测试面试题相关项目
URL:https://github.com/j2ekim/Pentest_Project
GitHub
GitHub - j2ekim/Pentest_Project: 整理渗透测试、内网渗透、应急响应、密码字典、漏洞库、代码审计、渗透测试面试题相关项目
整理渗透测试、内网渗透、应急响应、密码字典、漏洞库、代码审计、渗透测试面试题相关项目. Contribute to j2ekim/Pentest_Project development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:大创项目:基于对抗生成神经网络的Windows PE恶意代码免杀方法的研究与实现
URL:https://github.com/tonygao123/PE-AAV
更新了:免杀
描述:大创项目:基于对抗生成神经网络的Windows PE恶意代码免杀方法的研究与实现
URL:https://github.com/tonygao123/PE-AAV
GitHub
GitHub - tonygao123/PE-AAV: 大创项目:基于对抗生成神经网络的Windows PE恶意代码免杀方法的研究与实现
大创项目:基于对抗生成神经网络的Windows PE恶意代码免杀方法的研究与实现. Contribute to tonygao123/PE-AAV development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-43297 POC
URL:https://github.com/bitterzzZZ/CVE-2021-43297-POC
更新了:CVE-2021
描述:CVE-2021-43297 POC
URL:https://github.com/bitterzzZZ/CVE-2021-43297-POC
GitHub
GitHub - bitterzzZZ/CVE-2021-43297-POC: CVE-2021-43297 POC,Apache Dubbo<= 2.7.13时可以实现RCE
CVE-2021-43297 POC,Apache Dubbo<= 2.7.13时可以实现RCE. Contribute to bitterzzZZ/CVE-2021-43297-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Apache Dubbo Hessian2 CVE-2021-43297 demo
URL:https://github.com/longofo/Apache-Dubbo-Hessian2-CVE-2021-43297
更新了:CVE-2021
描述:Apache Dubbo Hessian2 CVE-2021-43297 demo
URL:https://github.com/longofo/Apache-Dubbo-Hessian2-CVE-2021-43297
GitHub
GitHub - longofo/Apache-Dubbo-Hessian2-CVE-2021-43297: Apache Dubbo Hessian2 CVE-2021-43297 demo
Apache Dubbo Hessian2 CVE-2021-43297 demo. Contribute to longofo/Apache-Dubbo-Hessian2-CVE-2021-43297 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:I'm putting together my class notes, practice results, and other information I accumulate over time on Red Team operation courses and work.
URL:https://github.com/SlyJose/Red-Team
更新了:Red Team
描述:I'm putting together my class notes, practice results, and other information I accumulate over time on Red Team operation courses and work.
URL:https://github.com/SlyJose/Red-Team
GitHub
GitHub - SlyJose/Red-Team: I'm putting together my class notes, practice results, and other information I accumulate over time…
I'm putting together my class notes, practice results, and other information I accumulate over time on Red Team operation courses and work. - GitHub - SlyJose/Red-Team: I'm putting ...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike BOF Files with Nim!
URL:https://github.com/byt3bl33d3r/BOF-Nim
更新了:Cobalt Strike
描述:Cobalt Strike BOF Files with Nim!
URL:https://github.com/byt3bl33d3r/BOF-Nim
GitHub
GitHub - byt3bl33d3r/BOF-Nim: Cobalt Strike BOF Files with Nim!
Cobalt Strike BOF Files with Nim! Contribute to byt3bl33d3r/BOF-Nim development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Terraform and Docker resources for quickly spinning up a test of CVE-2021-4428
URL:https://github.com/z3bul0n/log4jtest
更新了:CVE-2021
描述:Terraform and Docker resources for quickly spinning up a test of CVE-2021-4428
URL:https://github.com/z3bul0n/log4jtest
GitHub
GitHub - z3bul0n/log4jtest: Terraform and Docker resources for quickly spinning up a test of CVE-2021-44428
Terraform and Docker resources for quickly spinning up a test of CVE-2021-44428 - GitHub - z3bul0n/log4jtest: Terraform and Docker resources for quickly spinning up a test of CVE-2021-44428
GitHub监控消息提醒!!!
更新了:Red Team
描述:I'm putting together my class notes, practice results, and other information I accumulate over time on Red Team operation courses and work.
URL:https://github.com/Raviikanth/working-assgmnt
更新了:Red Team
描述:I'm putting together my class notes, practice results, and other information I accumulate over time on Red Team operation courses and work.
URL:https://github.com/Raviikanth/working-assgmnt
GitHub
GitHub - Raviikanth/working-assgmnt: <!DOCTYPE html> <html> <head> <link rel="stylesheet" href="https://stackpath.bootstr…
<!DOCTYPE html> <html> <head> <link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/bo...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Fix: CVE-2021-44228 4LOGJ
URL:https://github.com/tslenter/RS4LOGJ-CVE-2021-44228
更新了:CVE-2021
描述:Fix: CVE-2021-44228 4LOGJ
URL:https://github.com/tslenter/RS4LOGJ-CVE-2021-44228