GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Tinker Script for CVE-2022-23046
URL:https://github.com/bernauers/CVE-2022-23046
标签:#CVE-2022
更新了:CVE-2022
描述:Tinker Script for CVE-2022-23046
URL:https://github.com/bernauers/CVE-2022-23046
标签:#CVE-2022
GitHub
GitHub - bernauers/CVE-2022-23046: Tinker Script for CVE-2022-23046
Tinker Script for CVE-2022-23046. Contribute to bernauers/CVE-2022-23046 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:Tool to facilitate the management of our webshell from a terminal.
URL:https://github.com/DarkTrojanDev/PwnWebShell
标签:#webshell
更新了:webshell
描述:Tool to facilitate the management of our webshell from a terminal.
URL:https://github.com/DarkTrojanDev/PwnWebShell
标签:#webshell
GitHub
GitHub - DarkTrojanDev/PwnWebShell: Tool to facilitate the management of our webshell from a terminal.
Tool to facilitate the management of our webshell from a terminal. - GitHub - DarkTrojanDev/PwnWebShell: Tool to facilitate the management of our webshell from a terminal.
👍1
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.
URL:https://github.com/EspressoCake/DynamicTabRename
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.
URL:https://github.com/EspressoCake/DynamicTabRename
标签:#Cobalt Strike
GitHub
GitHub - EspressoCake/DynamicTabRename: CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike…
CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file. - EspressoCake/DynamicTabRename
GitHub监控消息提醒!!!
更新了:内存马
描述:通过jsp注入valve内存马,可以忽略框架影响,通用tomcat789
URL:https://github.com/Ghost2097221/addMemShellsJSP
标签:#内存马
更新了:内存马
描述:通过jsp注入valve内存马,可以忽略框架影响,通用tomcat789
URL:https://github.com/Ghost2097221/addMemShellsJSP
标签:#内存马
GitHub
GitHub - Ghost2097221/addMemShellsJSP: 通过jsp注入valve内存马,可以忽略框架影响,通用tomcat789
通过jsp注入valve内存马,可以忽略框架影响,通用tomcat789. Contribute to Ghost2097221/addMemShellsJSP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:Android XML自动 序列化/反序列化
URL:https://github.com/tencentyun/android-xml-serializer-deserializer
标签:#反序列化
更新了:反序列化
描述:Android XML自动 序列化/反序列化
URL:https://github.com/tencentyun/android-xml-serializer-deserializer
标签:#反序列化
GitHub
GitHub - tencentyun/android-xml-serializer-deserializer: Android XML自动 序列化/反序列化
Android XML自动 序列化/反序列化. Contribute to tencentyun/android-xml-serializer-deserializer development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-29221 Proof of Concept Code
URL:https://github.com/sbani/CVE-2022-29221-PoC
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-29221 Proof of Concept Code
URL:https://github.com/sbani/CVE-2022-29221-PoC
标签:#CVE-2022
GitHub
GitHub - sbani/CVE-2022-29221-PoC: CVE-2022-29221 Proof of Concept Code - Smarty RCE
CVE-2022-29221 Proof of Concept Code - Smarty RCE. Contribute to sbani/CVE-2022-29221-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:通过xpath注解对象的方式序列化以及反序列化xml
URL:https://github.com/wmz46/xpathmapper
标签:#反序列化
更新了:反序列化
描述:通过xpath注解对象的方式序列化以及反序列化xml
URL:https://github.com/wmz46/xpathmapper
标签:#反序列化
GitHub
GitHub - wmz46/xpathmapper: 通过xpath注解对象的方式序列化以及反序列化xml
通过xpath注解对象的方式序列化以及反序列化xml. Contribute to wmz46/xpathmapper development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Atlassian Jira Seraph Authentication Bypass Preauth-RCE(CVE-2022-0540)
URL:https://github.com/Pear1y/CVE-2022-0540-Preauth-RCE
标签:#CVE-2022
更新了:CVE-2022
描述:Atlassian Jira Seraph Authentication Bypass Preauth-RCE(CVE-2022-0540)
URL:https://github.com/Pear1y/CVE-2022-0540-Preauth-RCE
标签:#CVE-2022
GitHub
GitHub - Pear1y/CVE-2022-0540-RCE: Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)
Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540) - GitHub - Pear1y/CVE-2022-0540-RCE: Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)
URL:https://github.com/exploitwritter/CVE-2022-29337
标签:#CVE-2022
更新了:CVE-2022
描述:Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)
URL:https://github.com/exploitwritter/CVE-2022-29337
标签:#CVE-2022
GitHub
GitHub - exploitwritter/CVE-2022-29337: C-DATA FD702XW-X-R430 v2.1.13_X001 was discovered to contain a command injection vulnerability…
C-DATA FD702XW-X-R430 v2.1.13_X001 was discovered to contain a command injection vulnerability via the va_cmd parameter in formlanipv6. This vulnerability allows attackers to execute arbitrary comm...
GitHub监控消息提醒!!!
更新了:Red Team
描述:RedTeam - Red Team Tools
URL:https://github.com/Anlominus/RedTeam
标签:#Red Team
更新了:Red Team
描述:RedTeam - Red Team Tools
URL:https://github.com/Anlominus/RedTeam
标签:#Red Team
GitHub
GitHub - AnLoMinus/RedTeam: RedTeam - Red Team Tools
RedTeam - Red Team Tools. Contribute to AnLoMinus/RedTeam development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:<随时更新>USTC(南七)自动健康打卡+自动上传行程码+自动报备,操作简便。基于fork的老脚本进行了很多修改。无需开机即可打卡、云端自动配置环境、采用验证码识别进行身份认证,防止认证系统修补绕过漏洞。已正常运作超过半年,健康打卡系统没改的情况下绝对稳定。
URL:https://github.com/Kobe972/USTC-COVID19-AutoReport
标签:#绕过
更新了:绕过
描述:<随时更新>USTC(南七)自动健康打卡+自动上传行程码+自动报备,操作简便。基于fork的老脚本进行了很多修改。无需开机即可打卡、云端自动配置环境、采用验证码识别进行身份认证,防止认证系统修补绕过漏洞。已正常运作超过半年,健康打卡系统没改的情况下绝对稳定。
URL:https://github.com/Kobe972/USTC-COVID19-AutoReport
标签:#绕过
GitHub
GitHub - Kobe972/USTC-COVID19-AutoReport: <随时更新>USTC(南七)自动健康打卡+自动报备,操作简便。基于fork的老脚本进行了很多修改。使用github服务器自动打卡、无需配置依赖包、采用验证码识别进行身份…
<随时更新>USTC(南七)自动健康打卡+自动报备,操作简便。基于fork的老脚本进行了很多修改。使用github服务器自动打卡、无需配置依赖包、采用验证码识别进行身份认证,防止认证系统修补绕过漏洞。已正常运作超过一年,健康打卡系统没改的情况下绝对稳定。 - GitHub - Kobe972/USTC-COVID19-AutoReport: <随时更...
GitHub监控消息提醒!!!
更新了:绕过
描述:旋转验证码绕过, 本项目基于 构建图像特征库 预测验证码旋转角度的一种解决方案
URL:https://github.com/aiden2048/Rotate-Captcha-Angle-Prediction
标签:#绕过
更新了:绕过
描述:旋转验证码绕过, 本项目基于 构建图像特征库 预测验证码旋转角度的一种解决方案
URL:https://github.com/aiden2048/Rotate-Captcha-Angle-Prediction
标签:#绕过
GitHub
GitHub - aiden2048/Rotate-Captcha-Angle-Prediction: 旋转验证码绕过, 本项目基于 构建图像特征库 预测验证码旋转角度的一种解决方案 欢迎 Star ⭐
旋转验证码绕过, 本项目基于 构建图像特征库 预测验证码旋转角度的一种解决方案 欢迎 Star ⭐ - GitHub - aiden2048/Rotate-Captcha-Angle-Prediction: 旋转验证码绕过, 本项目基于 构建图像特征库 预测验证码旋转角度的一种解决方案 欢迎 Star ⭐
GitHub监控消息提醒!!!
更新了:Red Team
描述:Azure Container Instances Distributed Operations (acido CLI) for Red Team Operations through Azure Cloud.
URL:https://github.com/merabytes/acido
标签:#Red Team
更新了:Red Team
描述:Azure Container Instances Distributed Operations (acido CLI) for Red Team Operations through Azure Cloud.
URL:https://github.com/merabytes/acido
标签:#Red Team
GitHub
GitHub - merabytes/acido: Azure Container Instances Distributed Operations (acido CLI) for Red Team Operations through Azure Cloud.
Azure Container Instances Distributed Operations (acido CLI) for Red Team Operations through Azure Cloud. - GitHub - merabytes/acido: Azure Container Instances Distributed Operations (acido CLI) f...
GitHub监控消息提醒!!!
更新了:Red Team
描述: Cybersecurity Attacks - Red Team Strategies, Published by Packt
URL:https://github.com/PacktPublishing/Cybersecurity-Attacks---Red-Team-Strategies
标签:#Red Team
更新了:Red Team
描述: Cybersecurity Attacks - Red Team Strategies, Published by Packt
URL:https://github.com/PacktPublishing/Cybersecurity-Attacks---Red-Team-Strategies
标签:#Red Team
GitHub
GitHub - PacktPublishing/Cybersecurity-Attacks---Red-Team-Strategies: Cybersecurity Attacks - Red Team Strategies, Published by…
Cybersecurity Attacks - Red Team Strategies, Published by Packt - GitHub - PacktPublishing/Cybersecurity-Attacks---Red-Team-Strategies: Cybersecurity Attacks - Red Team Strategies, Published by Packt
👍1
GitHub监控消息提醒!!!
更新了:webshell
描述:Wefir's webshell : a custom webshell client
URL:https://github.com/mrlongsword/Wefir-webshell
标签:#webshell
更新了:webshell
描述:Wefir's webshell : a custom webshell client
URL:https://github.com/mrlongsword/Wefir-webshell
标签:#webshell
GitHub
GitHub - mrlongsword/Wefir-webshell: Wefir's webshell : a custom webshell client
Wefir's webshell : a custom webshell client. Contribute to mrlongsword/Wefir-webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Python script to exploit CVE-2022-29464 (mass mode)
URL:https://github.com/Chocapikk/CVE-2022-29464
标签:#CVE-2022
更新了:CVE-2022
描述:Python script to exploit CVE-2022-29464 (mass mode)
URL:https://github.com/Chocapikk/CVE-2022-29464
标签:#CVE-2022
GitHub
GitHub - Chocapikk/CVE-2022-29464: Python script to exploit CVE-2022-29464 (mass mode)
Python script to exploit CVE-2022-29464 (mass mode) - Chocapikk/CVE-2022-29464
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:一个自动挖掘漏洞的框架,日后会发展成强大的信息收集+漏洞挖掘脚本!
URL:https://github.com/Throokie/MmpScan
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:一个自动挖掘漏洞的框架,日后会发展成强大的信息收集+漏洞挖掘脚本!
URL:https://github.com/Throokie/MmpScan
标签:#漏洞挖掘
GitHub
GitHub - Throokie/MmpScan: 一个自动挖掘漏洞的框架,日后会发展成强大的信息收集+漏洞挖掘脚本!
一个自动挖掘漏洞的框架,日后会发展成强大的信息收集+漏洞挖掘脚本!. Contribute to Throokie/MmpScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记
URL:https://github.com/Relph1119/black-hat-python-2ed
标签:#渗透测试
更新了:渗透测试
描述:《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记
URL:https://github.com/Relph1119/black-hat-python-2ed
标签:#渗透测试
GitHub
GitHub - Relph1119/black-hat-python-2nd: 《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记
《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记 - GitHub - Relph1119/black-hat-python-2nd: 《Python黑帽子-黑客与渗透测试编程之道》(Black Hat Python, 2nd Edition)阅读笔记