GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process.
URL:https://github.com/ScriptIdiot/patchit
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process.
URL:https://github.com/ScriptIdiot/patchit
标签:#Cobalt Strike
GitHub
GitHub - ScriptIdiot/BOF-patchit: An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both…
An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are available. - ScriptIdiot/BOF-patchit
GitHub监控消息提醒!!!
更新了:代码审计
描述:Power7089的博客。专注渗透测试,Java代码审计,努力扬帆,驶向远方!
URL:https://github.com/Power7089/power7089.github.io
标签:#代码审计
更新了:代码审计
描述:Power7089的博客。专注渗透测试,Java代码审计,努力扬帆,驶向远方!
URL:https://github.com/Power7089/power7089.github.io
标签:#代码审计
GitHub
GitHub - Power7089/power7089.github.io: Power7089的博客。专注渗透测试,Java代码审计,努力扬帆,驶向远方!
Power7089的博客。专注渗透测试,Java代码审计,努力扬帆,驶向远方!. Contribute to Power7089/power7089.github.io development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:HTTP3-attacks (CVE-2022-30592)
URL:https://github.com/efchatz/HTTP3-attacks
标签:#CVE-2022
更新了:CVE-2022
描述:HTTP3-attacks (CVE-2022-30592)
URL:https://github.com/efchatz/HTTP3-attacks
标签:#CVE-2022
GitHub
GitHub - efchatz/HTTP3-attacks: HTTP3-attacks (CVE-2022-30592)
HTTP3-attacks (CVE-2022-30592). Contribute to efchatz/HTTP3-attacks development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:一款类似菜刀的webshell管理软件。基于UWP平台,以支持DPI缩放。目前是开发初期,还没有实现基本功能。
URL:https://github.com/dybb8999/HMagicShell
标签:#webshell
更新了:webshell
描述:一款类似菜刀的webshell管理软件。基于UWP平台,以支持DPI缩放。目前是开发初期,还没有实现基本功能。
URL:https://github.com/dybb8999/HMagicShell
标签:#webshell
GitHub
GitHub - dybb8999/HMagicShell: 一款类似菜刀的webshell管理软件。基于UWP平台,以支持DPI缩放。目前是开发初期,还没有实现基本功能。
一款类似菜刀的webshell管理软件。基于UWP平台,以支持DPI缩放。目前是开发初期,还没有实现基本功能。 - GitHub - dybb8999/HMagicShell: 一款类似菜刀的webshell管理软件。基于UWP平台,以支持DPI缩放。目前是开发初期,还没有实现基本功能。
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike UDRL for memory scanner evasion.
URL:https://github.com/kyleavery/AceLdr
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike UDRL for memory scanner evasion.
URL:https://github.com/kyleavery/AceLdr
标签:#Cobalt Strike
GitHub
GitHub - kyleavery/AceLdr: Cobalt Strike UDRL for memory scanner evasion.
Cobalt Strike UDRL for memory scanner evasion. Contribute to kyleavery/AceLdr development by creating an account on GitHub.
😁1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:This is working POC of CVE-2022-36271
URL:https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271
标签:#CVE-2022
更新了:CVE-2022
描述:This is working POC of CVE-2022-36271
URL:https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271
标签:#CVE-2022
GitHub
GitHub - SaumyajeetDas/POC-of-CVE-2022-36271: This is working POC of CVE-2022-36271
This is working POC of CVE-2022-36271 . Contribute to SaumyajeetDas/POC-of-CVE-2022-36271 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:利用缓冲区溢出执行特定代码(绕过静态检测)(现只有Ret2Libc技术的版本)
URL:https://github.com/StrawberryMilkChocolate00xff/Programming_SOF
标签:#绕过
更新了:绕过
描述:利用缓冲区溢出执行特定代码(绕过静态检测)(现只有Ret2Libc技术的版本)
URL:https://github.com/StrawberryMilkChocolate00xff/Programming_SOF
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]
URL:https://github.com/francozappa/blur
标签:#CVE-2022
更新了:CVE-2022
描述:BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]
URL:https://github.com/francozappa/blur
标签:#CVE-2022
GitHub
GitHub - francozappa/blur: BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE…
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361] - francozappa/blur
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:In-memory token vault BOF for Cobalt Strike
URL:https://github.com/Henkru/cs-token-vault
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:In-memory token vault BOF for Cobalt Strike
URL:https://github.com/Henkru/cs-token-vault
标签:#Cobalt Strike
GitHub
GitHub - Henkru/cs-token-vault: In-memory token vault BOF for Cobalt Strike
In-memory token vault BOF for Cobalt Strike. Contribute to Henkru/cs-token-vault development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Example payload for CVE-2022-21894
URL:https://github.com/sm0ke1337/CVE-2022-21894-Payload
标签:#CVE-2022
更新了:CVE-2022
描述:Example payload for CVE-2022-21894
URL:https://github.com/sm0ke1337/CVE-2022-21894-Payload
标签:#CVE-2022
GitHub
GitHub - sm0ke1337/CVE-2022-21894-Payload: Example payload for CVE-2022-21894
Example payload for CVE-2022-21894. Contribute to sm0ke1337/CVE-2022-21894-Payload development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Zimbra_Collaboration_CVE-2022-37042-_CVE-2022-27925
URL:https://github.com/GreyNoise-Intelligence/Zimbra_Collaboration_CVE-2022-37042-_CVE-2022-27925
标签:#CVE-2022
更新了:CVE-2022
描述:Zimbra_Collaboration_CVE-2022-37042-_CVE-2022-27925
URL:https://github.com/GreyNoise-Intelligence/Zimbra_Collaboration_CVE-2022-37042-_CVE-2022-27925
标签:#CVE-2022
GitHub
GitHub - GreyNoise-Intelligence/Zimbra_Collaboration_CVE-2022-37042-_CVE-2022-27925: Zimbra_Collaboration_CVE-2022-37042-_CVE-2022…
Zimbra_Collaboration_CVE-2022-37042-_CVE-2022-27925 - GitHub - GreyNoise-Intelligence/Zimbra_Collaboration_CVE-2022-37042-_CVE-2022-27925: Zimbra_Collaboration_CVE-2022-37042-_CVE-2022-27925
👍1
GitHub监控消息提醒!!!
更新了:反序列化
描述:反序列化,tomcat 的 header 过大问题
URL:https://github.com/1nhann/header_toolarge
标签:#反序列化
更新了:反序列化
描述:反序列化,tomcat 的 header 过大问题
URL:https://github.com/1nhann/header_toolarge
标签:#反序列化
GitHub
GitHub - 1nhann/header_toolarge: 反序列化,tomcat 的 header 过大问题
反序列化,tomcat 的 header 过大问题. Contribute to 1nhann/header_toolarge development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Zimbra CVE-2022-27925
URL:https://github.com/Josexv1/CVE-2022-27925
标签:#CVE-2022
更新了:CVE-2022
描述:Zimbra CVE-2022-27925
URL:https://github.com/Josexv1/CVE-2022-27925
标签:#CVE-2022
GitHub
GitHub - Josexv1/CVE-2022-27925: Zimbra CVE-2022-27925 PoC
Zimbra CVE-2022-27925 PoC. Contribute to Josexv1/CVE-2022-27925 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸
URL:https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸
URL:https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape
标签:#CVE-2022
GitHub
GitHub - yoeelingBin/CVE-2022-0847-Container-Escape: CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe)…
CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸 - yoeelingBin/CVE-2022-0847-Container-Escape
GitHub监控消息提醒!!!
更新了:钓鱼
描述:帝国cms仿《钓鱼人》钓鱼视频钓鱼行业网站源码 带火车头采集器
URL:https://github.com/wwwuuid2com31/1_6139
标签:#钓鱼
更新了:钓鱼
描述:帝国cms仿《钓鱼人》钓鱼视频钓鱼行业网站源码 带火车头采集器
URL:https://github.com/wwwuuid2com31/1_6139
标签:#钓鱼
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:一款在红蓝对抗中快速对目标单位进行资产探测和基本扫描的工具
URL:https://github.com/ExpLangcn/HvvInfo
标签:#红蓝对抗
更新了:红蓝对抗
描述:一款在红蓝对抗中快速对目标单位进行资产探测和基本扫描的工具
URL:https://github.com/ExpLangcn/HvvInfo
标签:#红蓝对抗
GitHub
GitHub - ExpLangcn/HvvInfo: 一款在红蓝对抗中快速对目标单位进行资产探测和基本扫描的工具
一款在红蓝对抗中快速对目标单位进行资产探测和基本扫描的工具. Contribute to ExpLangcn/HvvInfo development by creating an account on GitHub.
😁1