GitHub监控消息提醒!!!
更新了:webshell
描述:A webshell plugin and interactive shell for pentesting a SweetRice website.
URL:https://github.com/p0dalirius/SweetRice-webshell-plugin
标签:#webshell
更新了:webshell
描述:A webshell plugin and interactive shell for pentesting a SweetRice website.
URL:https://github.com/p0dalirius/SweetRice-webshell-plugin
标签:#webshell
GitHub
GitHub - p0dalirius/SweetRice-webshell-plugin: A webshell plugin and interactive shell for pentesting a SweetRice website.
A webshell plugin and interactive shell for pentesting a SweetRice website. - p0dalirius/SweetRice-webshell-plugin
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Mitigates the \"Folina\"-ZeroDay (CVE-2022-30190)
URL:https://github.com/derco0n/mitigate-folina
标签:#CVE-2022
更新了:CVE-2022
描述:Mitigates the \"Folina\"-ZeroDay (CVE-2022-30190)
URL:https://github.com/derco0n/mitigate-folina
标签:#CVE-2022
GitHub
GitHub - derco0n/mitigate-folina: Mitigates the "Folina"-ZeroDay (CVE-2022-30190)
Mitigates the "Folina"-ZeroDay (CVE-2022-30190). Contribute to derco0n/mitigate-folina development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:一款shellcode免杀工具,免杀测试对象火绒 联想等其他杀软
URL:https://github.com/huadema/shellcode_loader
标签:#免杀
更新了:免杀
描述:一款shellcode免杀工具,免杀测试对象火绒 联想等其他杀软
URL:https://github.com/huadema/shellcode_loader
标签:#免杀
GitHub
GitHub - Avienma/shellcode_loader: 一款shellcode免杀工具,免杀测试对象火绒 联想等其他杀软
一款shellcode免杀工具,免杀测试对象火绒 联想等其他杀软. Contribute to Avienma/shellcode_loader development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。
URL:https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。
URL:https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed
标签:#CVE-2022
GitHub
GitHub - komomon/CVE-2022-30190-follina-Office-MSDT-Fixed: CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。
CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。 - komomon/CVE-2022-30190-follina-Office-MSDT-Fixed
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:The CVE-2022-30190-follina Workarounds Patch
URL:https://github.com/suegdu/CVE-2022-30190-Follina-Patch
标签:#CVE-2022
更新了:CVE-2022
描述:The CVE-2022-30190-follina Workarounds Patch
URL:https://github.com/suegdu/CVE-2022-30190-Follina-Patch
标签:#CVE-2022
GitHub
GitHub - suegdu/CVE-2022-30190-Follina-Patch: The CVE-2022-30190-follina Workarounds Patch
The CVE-2022-30190-follina Workarounds Patch. Contribute to suegdu/CVE-2022-30190-Follina-Patch development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:The CVE-2022-30190-follina Workarounds Patch
URL:https://github.com/sentinelblue/CVE-2022-30190
标签:#CVE-2022
更新了:CVE-2022
描述:The CVE-2022-30190-follina Workarounds Patch
URL:https://github.com/sentinelblue/CVE-2022-30190
标签:#CVE-2022
GitHub
GitHub - sentinelblue/CVE-2022-30190: Microsoft Sentinel analytic rule and hunting queries in ASIM for activity of MSDT and CVE…
Microsoft Sentinel analytic rule and hunting queries in ASIM for activity of MSDT and CVE-2022-30190. - sentinelblue/CVE-2022-30190
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:PDQ Package I created for CVE-2022-30190
URL:https://github.com/castlesmadeofsand/ms-msdt-vulnerability-pdq-package
标签:#CVE-2022
更新了:CVE-2022
描述:PDQ Package I created for CVE-2022-30190
URL:https://github.com/castlesmadeofsand/ms-msdt-vulnerability-pdq-package
标签:#CVE-2022
GitHub
GitHub - castlesmadeofsand/ms-msdt-vulnerability-pdq-package: PDQ Package I created for CVE-2022-30190
PDQ Package I created for CVE-2022-30190. Contribute to castlesmadeofsand/ms-msdt-vulnerability-pdq-package development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-30190 | MS-MSDT Follina One Click
URL:https://github.com/AchocolatechipPancake/MS-MSDT-Office-RCE-Follina
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-30190 | MS-MSDT Follina One Click
URL:https://github.com/AchocolatechipPancake/MS-MSDT-Office-RCE-Follina
标签:#CVE-2022
GitHub
GitHub - 0xflagplz/MS-MSDT-Office-RCE-Follina: CVE-2022-30190 | MS-MSDT Follina One Click
CVE-2022-30190 | MS-MSDT Follina One Click. Contribute to 0xflagplz/MS-MSDT-Office-RCE-Follina development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-30190 Zero click rce Mass Exploitation Tool with Multi threading capabilities
URL:https://github.com/Kesinger57/CVE-2022-30190-mass-rce
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-30190 Zero click rce Mass Exploitation Tool with Multi threading capabilities
URL:https://github.com/Kesinger57/CVE-2022-30190-mass-rce
标签:#CVE-2022
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Bash poc for CVE-2022-1609 WordPress Weblizar Backdoor
URL:https://github.com/NullBrunk/CVE-2022-1609
标签:#CVE-2022
更新了:CVE-2022
描述:Bash poc for CVE-2022-1609 WordPress Weblizar Backdoor
URL:https://github.com/NullBrunk/CVE-2022-1609
标签:#CVE-2022
GitHub
GitHub - NullBrunk/CVE-2022-1609: Bash poc for CVE-2022-1609 WordPress Weblizar Backdoor
Bash poc for CVE-2022-1609 WordPress Weblizar Backdoor - GitHub - NullBrunk/CVE-2022-1609: Bash poc for CVE-2022-1609 WordPress Weblizar Backdoor
GitHub监控消息提醒!!!
更新了:渗透测试
描述:setool-main企业级高级社会工程学渗透测试工具集
URL:https://github.com/LinWin-Cloud/setool-main
标签:#渗透测试
更新了:渗透测试
描述:setool-main企业级高级社会工程学渗透测试工具集
URL:https://github.com/LinWin-Cloud/setool-main
标签:#渗透测试
GitHub
GitHub - LinWin-Cloud/Setool-Main: (入门不当可能导致入狱) 基于linux的企业级别社会工程学渗透测试、轻量级别Web渗透辅助。内置的钓鱼网站可以获取主要的个人信息账户;网站克隆模块可以把白宫网站给克隆下来;内置的各…
(入门不当可能导致入狱) 基于linux的企业级别社会工程学渗透测试、轻量级别Web渗透辅助。内置的钓鱼网站可以获取主要的个人信息账户;网站克隆模块可以把白宫网站给克隆下来;内置的各种Web终端完全可以群体性的攻击和对社会工程学的测试;破坏性脚本和半自动编写勒索信完美辅助了社工等等。使用Java开发,参考了大大小小的企业级别社会工程学案例,定制出的一款适用于企业级别的社工测试和攻击的高级命令...
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Microsoft's recommended mitigation for CVE-2022-30190 using Powershell
URL:https://github.com/hilt86/cve-2022-30190-mitigate
标签:#CVE-2022
更新了:CVE-2022
描述:Microsoft's recommended mitigation for CVE-2022-30190 using Powershell
URL:https://github.com/hilt86/cve-2022-30190-mitigate
标签:#CVE-2022
GitHub
GitHub - hilt86/cve-2022-30190-mitigate: Powershell script to mitigate cve-2022-30190
Powershell script to mitigate cve-2022-30190. Contribute to hilt86/cve-2022-30190-mitigate development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Information and scripts for the confluence CVE-2022-26134
URL:https://github.com/offlinehoster/CVE-2022-26134
标签:#CVE-2022
更新了:CVE-2022
描述:Information and scripts for the confluence CVE-2022-26134
URL:https://github.com/offlinehoster/CVE-2022-26134
标签:#CVE-2022
GitHub
GitHub - offlinehoster/CVE-2022-26134: Information and scripts for the confluence CVE-2022-26134
Information and scripts for the confluence CVE-2022-26134 - offlinehoster/CVE-2022-26134
GitHub监控消息提醒!!!
更新了:Red Team
描述:Offensive Security | Red Team
URL:https://github.com/cyberkhalid/cyberkhalid.github.io
标签:#Red Team
更新了:Red Team
描述:Offensive Security | Red Team
URL:https://github.com/cyberkhalid/cyberkhalid.github.io
标签:#Red Team
GitHub
GitHub - cyberkhalid/cyberkhalid.github.io: Offensive Security | Red Team
Offensive Security | Red Team. Contribute to cyberkhalid/cyberkhalid.github.io development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:VMware Workspace ONE Access and Identity Manager RCE via SSTI. CVE-2022-22954 - PoC SSTI * exploit+payload+shodan (ну набором)
URL:https://github.com/badboy-sft/CVE-2022-22954
标签:#CVE-2022
更新了:CVE-2022
描述:VMware Workspace ONE Access and Identity Manager RCE via SSTI. CVE-2022-22954 - PoC SSTI * exploit+payload+shodan (ну набором)
URL:https://github.com/badboy-sft/CVE-2022-22954
标签:#CVE-2022
GitHub
GitHub - b4dboy17/CVE-2022-22954: VMware Workspace ONE Access and Identity Manager RCE via SSTI. CVE-2022-22954 - PoC SSTI * e…
VMware Workspace ONE Access and Identity Manager RCE via SSTI. CVE-2022-22954 - PoC SSTI * exploit+payload+shodan (ну набором) - b4dboy17/CVE-2022-22954
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:0-DAY: Unauthenticated Remote Code Execution in Atlassian Confluence (CVE-2022-26134).
URL:https://github.com/CyberDonkyx0/CVE-2022-26134
标签:#CVE-2022
更新了:CVE-2022
描述:0-DAY: Unauthenticated Remote Code Execution in Atlassian Confluence (CVE-2022-26134).
URL:https://github.com/CyberDonkyx0/CVE-2022-26134
标签:#CVE-2022
GitHub
GitHub - CyberDonkyx0/CVE-2022-26134: 0-DAY: Unauthenticated Remote Code Execution in Atlassian Confluence (CVE-2022-26134).
0-DAY: Unauthenticated Remote Code Execution in Atlassian Confluence (CVE-2022-26134). - GitHub - CyberDonkyx0/CVE-2022-26134: 0-DAY: Unauthenticated Remote Code Execution in Atlassian Confluence (...
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-26134 vuln domains
URL:https://github.com/s0rtega/CVE-2022-26134_vuln
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-26134 vuln domains
URL:https://github.com/s0rtega/CVE-2022-26134_vuln
标签:#CVE-2022
👍1
GitHub监控消息提醒!!!
更新了:bypass av
描述:shell code bypass av
URL:https://github.com/DanTiao7/AVsleep
标签:#bypass av
更新了:bypass av
描述:shell code bypass av
URL:https://github.com/DanTiao7/AVsleep
标签:#bypass av
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:MASS EXPLOITATION TOOL FOR CVE-2022-26134 an Unauthenticated Remote Code Execution in Atlassian Confluence (CVE-2022-26134)
URL:https://github.com/DeavoDave/CVE-2022-26134-Mass-Rce
标签:#CVE-2022
更新了:CVE-2022
描述:MASS EXPLOITATION TOOL FOR CVE-2022-26134 an Unauthenticated Remote Code Execution in Atlassian Confluence (CVE-2022-26134)
URL:https://github.com/DeavoDave/CVE-2022-26134-Mass-Rce
标签:#CVE-2022