GitHub监控消息提醒!!!
更新了:webshell
描述:A webshell that can bypass some system security
URL:https://github.com/22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor
标签:#webshell
更新了:webshell
描述:A webshell that can bypass some system security
URL:https://github.com/22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor
标签:#webshell
GitHub
GitHub - 22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor: A webshell that can bypass some system security, all code has been obfuscated…
A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely. - 22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor
GitHub监控消息提醒!!!
更新了:反序列化
描述:用友NC反序列化漏洞payload生成
URL:https://github.com/Ghost2097221/YongyouNC-Unserialize-Tools
标签:#反序列化
更新了:反序列化
描述:用友NC反序列化漏洞payload生成
URL:https://github.com/Ghost2097221/YongyouNC-Unserialize-Tools
标签:#反序列化
GitHub监控消息提醒!!!
更新了:webshell
描述:A python based webshell discovery and decoder for static packet captures. Designed to be extended for easy identification and decoding of many webshell families.
URL:https://github.com/fredflinch/mothra
标签:#webshell
更新了:webshell
描述:A python based webshell discovery and decoder for static packet captures. Designed to be extended for easy identification and decoding of many webshell families.
URL:https://github.com/fredflinch/mothra
标签:#webshell
GitHub
GitHub - fredflinch/mothra: A python based webshell discovery and decoder for static packet captures. Designed to be extended for…
A python based webshell discovery and decoder for static packet captures. Designed to be extended for easy identification and decoding of many webshell families. - fredflinch/mothra
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Apache Spark RCE - CVE-2022-33891
URL:https://github.com/Vulnmachines/Apache-spark-CVE-2022-33891
标签:#CVE-2022
更新了:CVE-2022
描述:Apache Spark RCE - CVE-2022-33891
URL:https://github.com/Vulnmachines/Apache-spark-CVE-2022-33891
标签:#CVE-2022
GitHub
GitHub - Vulnmachines/Apache-spark-CVE-2022-33891: Apache Spark RCE - CVE-2022-33891
Apache Spark RCE - CVE-2022-33891. Contribute to Vulnmachines/Apache-spark-CVE-2022-33891 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:For penetration testing / Red Team / CTF / Cybersecurity / Certifications
URL:https://github.com/CyberSecurity2045/Pentest
标签:#Red Team
更新了:Red Team
描述:For penetration testing / Red Team / CTF / Cybersecurity / Certifications
URL:https://github.com/CyberSecurity2045/Pentest
标签:#Red Team
GitHub监控消息提醒!!!
更新了:网络攻防
描述:Websec是一份Web技术演化的电子书记,内容包含计算机网络协议,信息收集,常见漏洞攻防,语言框架,内网渗透,云安全,防御技术等常见技术集合的一份电子书。
URL:https://github.com/dioos886/websec-readthedocs-io-zh-latest
标签:#网络攻防
更新了:网络攻防
描述:Websec是一份Web技术演化的电子书记,内容包含计算机网络协议,信息收集,常见漏洞攻防,语言框架,内网渗透,云安全,防御技术等常见技术集合的一份电子书。
URL:https://github.com/dioos886/websec-readthedocs-io-zh-latest
标签:#网络攻防
GitHub
GitHub - dioos886/websec-readthedocs-io-zh-latest: Websec是一份Web技术演化的电子书记,内容包含计算机网络协议,信息收集,常见漏洞攻防,语言框架,内网渗透,云安全,防御技术等常见技术集合的一份电子书。
Websec是一份Web技术演化的电子书记,内容包含计算机网络协议,信息收集,常见漏洞攻防,语言框架,内网渗透,云安全,防御技术等常见技术集合的一份电子书。 - dioos886/websec-readthedocs-io-zh-latest
GitHub监控消息提醒!!!
更新了:钓鱼
描述:原神脚本,包含自动钓鱼、自动拾取、战斗辅助等多项功能。A sweet genshin impact script, contains many functions such as auto-fishing, auto-pickup, battle assist, etc.
URL:https://github.com/phonowell/genshin-impact-script
标签:#钓鱼
更新了:钓鱼
描述:原神脚本,包含自动钓鱼、自动拾取、战斗辅助等多项功能。A sweet genshin impact script, contains many functions such as auto-fishing, auto-pickup, battle assist, etc.
URL:https://github.com/phonowell/genshin-impact-script
标签:#钓鱼
GitHub
GitHub - phonowell/genshin-impact-script: 原神脚本,包含自动钓鱼、自动拾取、自动跳过对话等多项实用功能。A Genshin Impact script includes many useful features…
原神脚本,包含自动钓鱼、自动拾取、自动跳过对话等多项实用功能。A Genshin Impact script includes many useful features such as automatic fishing, automatic item pickup, automatic dialogue skipping, etc. - phonowell/genshin-impact-s...
GitHub监控消息提醒!!!
更新了:漏洞POC
描述:非常专业的漏洞整理、团队漏洞利用管理、漏洞Poc验证利用、接口使用、漏洞批量利用工具。
URL:https://github.com/Un1kTeam/Un1kPoc
标签:#漏洞POC
更新了:漏洞POC
描述:非常专业的漏洞整理、团队漏洞利用管理、漏洞Poc验证利用、接口使用、漏洞批量利用工具。
URL:https://github.com/Un1kTeam/Un1kPoc
标签:#漏洞POC
GitHub
GitHub - h4ckdepy/Un1kPoc: 非常专业的漏洞POC管理、团队授权化漏洞管理、漏洞验证利用、漏洞批量利用框架。
非常专业的漏洞POC管理、团队授权化漏洞管理、漏洞验证利用、漏洞批量利用框架。. Contribute to h4ckdepy/Un1kPoc development by creating an account on GitHub.
👍2
GitHub监控消息提醒!!!
更新了:漏洞EXP
描述:a exp about upload bug in order to bypass Header checksum.一个关于上传漏洞绕过文件头校验的利用工具
URL:https://github.com/youyou-pm10/upload-exp
标签:#漏洞EXP
更新了:漏洞EXP
描述:a exp about upload bug in order to bypass Header checksum.一个关于上传漏洞绕过文件头校验的利用工具
URL:https://github.com/youyou-pm10/upload-exp
标签:#漏洞EXP
GitHub
GitHub - youyou-pm10/upload-exp: a exp about upload bug in order to bypass Header checksum.一个关于上传漏洞绕过文件头校验的利用工具
a exp about upload bug in order to bypass Header checksum.一个关于上传漏洞绕过文件头校验的利用工具 - youyou-pm10/upload-exp
👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Powertek PDU身份绕过
URL:https://github.com/Henry4E36/CVE-2022-33174
标签:#CVE-2022
更新了:CVE-2022
描述:Powertek PDU身份绕过
URL:https://github.com/Henry4E36/CVE-2022-33174
标签:#CVE-2022
GitHub
GitHub - Henry4E36/CVE-2022-33174: Powertek PDU身份绕过
Powertek PDU身份绕过. Contribute to Henry4E36/CVE-2022-33174 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload
URL:https://github.com/hosch3n/FastjsonVulns
标签:#CVE-2022
更新了:CVE-2022
描述:[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload
URL:https://github.com/hosch3n/FastjsonVulns
标签:#CVE-2022
GitHub
GitHub - hosch3n/FastjsonVulns: [fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload
[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload - hosch3n/FastjsonVulns
👍1
😁2👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Zabbix-SAML-Bypass: CVE-2022-23131
URL:https://github.com/Vulnmachines/Zabbix-CVE-2022-23131
标签:#CVE-2022
更新了:CVE-2022
描述:Zabbix-SAML-Bypass: CVE-2022-23131
URL:https://github.com/Vulnmachines/Zabbix-CVE-2022-23131
标签:#CVE-2022
GitHub
GitHub - Vulnmachines/Zabbix-CVE-2022-23131: Zabbix-SAML-Bypass: CVE-2022-23131
Zabbix-SAML-Bypass: CVE-2022-23131. Contribute to Vulnmachines/Zabbix-CVE-2022-23131 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:免杀
描述:ShellCode_Loader - Msf&CobaltStrike免杀ShellCode加载器、Shellcode_encryption - 免杀Shellcode加密生成工具,目前测试免杀360&火绒&电脑管家&Windows Defender(其他杀软未测试)。
URL:https://github.com/Axx8/ShellCode_Loader
标签:#免杀
更新了:免杀
描述:ShellCode_Loader - Msf&CobaltStrike免杀ShellCode加载器、Shellcode_encryption - 免杀Shellcode加密生成工具,目前测试免杀360&火绒&电脑管家&Windows Defender(其他杀软未测试)。
URL:https://github.com/Axx8/ShellCode_Loader
标签:#免杀
GitHub
GitHub - Axx8/ShellCode_Loader: ShellCode_Loader - Msf&CobaltStrike免杀ShellCode加载器、Shellcode_encryption - 免杀Shellcode加密生成工具,目前测…
ShellCode_Loader - Msf&CobaltStrike免杀ShellCode加载器、Shellcode_encryption - 免杀Shellcode加密生成工具,目前测试免杀360&火绒&电脑管家&Windows Defender(其他杀软未测试)。 - Axx8/ShellCode_Loader
GitHub监控消息提醒!!!
更新了:webshell
描述:A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS.
URL:https://github.com/cr1f/P.A.S.-Fork
标签:#webshell
更新了:webshell
描述:A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS.
URL:https://github.com/cr1f/P.A.S.-Fork
标签:#webshell
GitHub
GitHub - cr1f/P.A.S.-Fork: A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting…
A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS. - cr1f/P.A.S.-Fork
👍4🔥1👏1🤩1