GitHub监控消息提醒!!!
更新了:Red Team
描述:In this repo you will find some projects related to Red Teaming
URL:https://github.com/pathakabhi24/RedTeam-Projects
标签:#Red Team
更新了:Red Team
描述:In this repo you will find some projects related to Red Teaming
URL:https://github.com/pathakabhi24/RedTeam-Projects
标签:#Red Team
GitHub
GitHub - pathakabhi24/RedTeam-Projects: In this repo you will find some projects related to Red Teaming
In this repo you will find some projects related to Red Teaming - GitHub - pathakabhi24/RedTeam-Projects: In this repo you will find some projects related to Red Teaming
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles
URL:https://github.com/CodeXTF2/Burp2Malleable
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles
URL:https://github.com/CodeXTF2/Burp2Malleable
标签:#Cobalt Strike
GitHub
GitHub - CodeXTF2/Burp2Malleable: Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable…
Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles - CodeXTF2/Burp2Malleable
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-24500 Windows SMB Unauthenticated Remote Code Execution Vulnerability
URL:https://github.com/Daro1967/CVE-2022-24500-MASS-RCE
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-24500 Windows SMB Unauthenticated Remote Code Execution Vulnerability
URL:https://github.com/Daro1967/CVE-2022-24500-MASS-RCE
标签:#CVE-2022
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:https://nvd.nist.gov/vuln/detail/CVE-2022-34169
URL:https://github.com/bor8/CVE-2022-34169
标签:#CVE-2022
更新了:CVE-2022
描述:https://nvd.nist.gov/vuln/detail/CVE-2022-34169
URL:https://github.com/bor8/CVE-2022-34169
标签:#CVE-2022
GitHub
GitHub - bor8/CVE-2022-34169: https://nvd.nist.gov/vuln/detail/CVE-2022-34169
https://nvd.nist.gov/vuln/detail/CVE-2022-34169. Contribute to bor8/CVE-2022-34169 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445
URL:https://github.com/Ziggy78/CVE-2022-26809-MASS-RCE
标签:#CVE-2022
更新了:CVE-2022
描述:metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445
URL:https://github.com/Ziggy78/CVE-2022-26809-MASS-RCE
标签:#CVE-2022
GitHub监控消息提醒!!!
更新了:漏洞EXP
描述:白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目
URL:https://github.com/BaizeSec/bylibrary
标签:#漏洞EXP
更新了:漏洞EXP
描述:白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目
URL:https://github.com/BaizeSec/bylibrary
标签:#漏洞EXP
GitHub
GitHub - BaizeSec/bylibrary: 白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目
白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目. Contribute to BaizeSec/bylibrary development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)
URL:https://github.com/jbaines-r7/theway
标签:#CVE-2022
更新了:CVE-2022
描述:A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)
URL:https://github.com/jbaines-r7/theway
标签:#CVE-2022
GitHub
GitHub - jbaines-r7/theway: A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)
A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829) - jbaines-r7/theway
GitHub监控消息提醒!!!
更新了:Red Team
描述:Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad de Santiago, agosto 2022.
URL:https://github.com/Ppamo/usach_phishing_lab_202208
标签:#Red Team
更新了:Red Team
描述:Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad de Santiago, agosto 2022.
URL:https://github.com/Ppamo/usach_phishing_lab_202208
标签:#Red Team
GitHub
GitHub - Ppamo/usach_phishing_lab_202208: Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad…
Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad de Santiago, agosto 2022. - Ppamo/usach_phishing_lab_202208
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process.
URL:https://github.com/ScriptIdiot/patchit
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process.
URL:https://github.com/ScriptIdiot/patchit
标签:#Cobalt Strike
GitHub
GitHub - ScriptIdiot/BOF-patchit: An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both…
An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are available. - ScriptIdiot/BOF-patchit
GitHub监控消息提醒!!!
更新了:代码审计
描述:Power7089的博客。专注渗透测试,Java代码审计,努力扬帆,驶向远方!
URL:https://github.com/Power7089/power7089.github.io
标签:#代码审计
更新了:代码审计
描述:Power7089的博客。专注渗透测试,Java代码审计,努力扬帆,驶向远方!
URL:https://github.com/Power7089/power7089.github.io
标签:#代码审计
GitHub
GitHub - Power7089/power7089.github.io: Power7089的博客。专注渗透测试,Java代码审计,努力扬帆,驶向远方!
Power7089的博客。专注渗透测试,Java代码审计,努力扬帆,驶向远方!. Contribute to Power7089/power7089.github.io development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:HTTP3-attacks (CVE-2022-30592)
URL:https://github.com/efchatz/HTTP3-attacks
标签:#CVE-2022
更新了:CVE-2022
描述:HTTP3-attacks (CVE-2022-30592)
URL:https://github.com/efchatz/HTTP3-attacks
标签:#CVE-2022
GitHub
GitHub - efchatz/HTTP3-attacks: HTTP3-attacks (CVE-2022-30592)
HTTP3-attacks (CVE-2022-30592). Contribute to efchatz/HTTP3-attacks development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:一款类似菜刀的webshell管理软件。基于UWP平台,以支持DPI缩放。目前是开发初期,还没有实现基本功能。
URL:https://github.com/dybb8999/HMagicShell
标签:#webshell
更新了:webshell
描述:一款类似菜刀的webshell管理软件。基于UWP平台,以支持DPI缩放。目前是开发初期,还没有实现基本功能。
URL:https://github.com/dybb8999/HMagicShell
标签:#webshell
GitHub
GitHub - dybb8999/HMagicShell: 一款类似菜刀的webshell管理软件。基于UWP平台,以支持DPI缩放。目前是开发初期,还没有实现基本功能。
一款类似菜刀的webshell管理软件。基于UWP平台,以支持DPI缩放。目前是开发初期,还没有实现基本功能。 - GitHub - dybb8999/HMagicShell: 一款类似菜刀的webshell管理软件。基于UWP平台,以支持DPI缩放。目前是开发初期,还没有实现基本功能。
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike UDRL for memory scanner evasion.
URL:https://github.com/kyleavery/AceLdr
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike UDRL for memory scanner evasion.
URL:https://github.com/kyleavery/AceLdr
标签:#Cobalt Strike
GitHub
GitHub - kyleavery/AceLdr: Cobalt Strike UDRL for memory scanner evasion.
Cobalt Strike UDRL for memory scanner evasion. Contribute to kyleavery/AceLdr development by creating an account on GitHub.
😁1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:This is working POC of CVE-2022-36271
URL:https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271
标签:#CVE-2022
更新了:CVE-2022
描述:This is working POC of CVE-2022-36271
URL:https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271
标签:#CVE-2022
GitHub
GitHub - SaumyajeetDas/POC-of-CVE-2022-36271: This is working POC of CVE-2022-36271
This is working POC of CVE-2022-36271 . Contribute to SaumyajeetDas/POC-of-CVE-2022-36271 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:利用缓冲区溢出执行特定代码(绕过静态检测)(现只有Ret2Libc技术的版本)
URL:https://github.com/StrawberryMilkChocolate00xff/Programming_SOF
标签:#绕过
更新了:绕过
描述:利用缓冲区溢出执行特定代码(绕过静态检测)(现只有Ret2Libc技术的版本)
URL:https://github.com/StrawberryMilkChocolate00xff/Programming_SOF
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]
URL:https://github.com/francozappa/blur
标签:#CVE-2022
更新了:CVE-2022
描述:BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]
URL:https://github.com/francozappa/blur
标签:#CVE-2022
GitHub
GitHub - francozappa/blur: BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE…
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361] - francozappa/blur
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:In-memory token vault BOF for Cobalt Strike
URL:https://github.com/Henkru/cs-token-vault
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:In-memory token vault BOF for Cobalt Strike
URL:https://github.com/Henkru/cs-token-vault
标签:#Cobalt Strike
GitHub
GitHub - Henkru/cs-token-vault: In-memory token vault BOF for Cobalt Strike
In-memory token vault BOF for Cobalt Strike. Contribute to Henkru/cs-token-vault development by creating an account on GitHub.