GitHub监控消息提醒!!!
更新了:webshell
描述:A python based webshell discovery and decoder for static packet captures. Designed to be extended for easy identification and decoding of many webshell families.
URL:https://github.com/fredflinch/mothra
标签:#webshell
更新了:webshell
描述:A python based webshell discovery and decoder for static packet captures. Designed to be extended for easy identification and decoding of many webshell families.
URL:https://github.com/fredflinch/mothra
标签:#webshell
GitHub
GitHub - fredflinch/mothra: A python based webshell discovery and decoder for static packet captures. Designed to be extended for…
A python based webshell discovery and decoder for static packet captures. Designed to be extended for easy identification and decoding of many webshell families. - fredflinch/mothra
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Apache Spark RCE - CVE-2022-33891
URL:https://github.com/Vulnmachines/Apache-spark-CVE-2022-33891
标签:#CVE-2022
更新了:CVE-2022
描述:Apache Spark RCE - CVE-2022-33891
URL:https://github.com/Vulnmachines/Apache-spark-CVE-2022-33891
标签:#CVE-2022
GitHub
GitHub - Vulnmachines/Apache-spark-CVE-2022-33891: Apache Spark RCE - CVE-2022-33891
Apache Spark RCE - CVE-2022-33891. Contribute to Vulnmachines/Apache-spark-CVE-2022-33891 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:For penetration testing / Red Team / CTF / Cybersecurity / Certifications
URL:https://github.com/CyberSecurity2045/Pentest
标签:#Red Team
更新了:Red Team
描述:For penetration testing / Red Team / CTF / Cybersecurity / Certifications
URL:https://github.com/CyberSecurity2045/Pentest
标签:#Red Team
GitHub监控消息提醒!!!
更新了:网络攻防
描述:Websec是一份Web技术演化的电子书记,内容包含计算机网络协议,信息收集,常见漏洞攻防,语言框架,内网渗透,云安全,防御技术等常见技术集合的一份电子书。
URL:https://github.com/dioos886/websec-readthedocs-io-zh-latest
标签:#网络攻防
更新了:网络攻防
描述:Websec是一份Web技术演化的电子书记,内容包含计算机网络协议,信息收集,常见漏洞攻防,语言框架,内网渗透,云安全,防御技术等常见技术集合的一份电子书。
URL:https://github.com/dioos886/websec-readthedocs-io-zh-latest
标签:#网络攻防
GitHub
GitHub - dioos886/websec-readthedocs-io-zh-latest: Websec是一份Web技术演化的电子书记,内容包含计算机网络协议,信息收集,常见漏洞攻防,语言框架,内网渗透,云安全,防御技术等常见技术集合的一份电子书。
Websec是一份Web技术演化的电子书记,内容包含计算机网络协议,信息收集,常见漏洞攻防,语言框架,内网渗透,云安全,防御技术等常见技术集合的一份电子书。 - dioos886/websec-readthedocs-io-zh-latest
GitHub监控消息提醒!!!
更新了:钓鱼
描述:原神脚本,包含自动钓鱼、自动拾取、战斗辅助等多项功能。A sweet genshin impact script, contains many functions such as auto-fishing, auto-pickup, battle assist, etc.
URL:https://github.com/phonowell/genshin-impact-script
标签:#钓鱼
更新了:钓鱼
描述:原神脚本,包含自动钓鱼、自动拾取、战斗辅助等多项功能。A sweet genshin impact script, contains many functions such as auto-fishing, auto-pickup, battle assist, etc.
URL:https://github.com/phonowell/genshin-impact-script
标签:#钓鱼
GitHub
GitHub - phonowell/genshin-impact-script: 原神脚本,包含自动钓鱼、自动拾取、自动跳过对话等多项实用功能。A Genshin Impact script includes many useful features…
原神脚本,包含自动钓鱼、自动拾取、自动跳过对话等多项实用功能。A Genshin Impact script includes many useful features such as automatic fishing, automatic item pickup, automatic dialogue skipping, etc. - phonowell/genshin-impact-s...
GitHub监控消息提醒!!!
更新了:漏洞POC
描述:非常专业的漏洞整理、团队漏洞利用管理、漏洞Poc验证利用、接口使用、漏洞批量利用工具。
URL:https://github.com/Un1kTeam/Un1kPoc
标签:#漏洞POC
更新了:漏洞POC
描述:非常专业的漏洞整理、团队漏洞利用管理、漏洞Poc验证利用、接口使用、漏洞批量利用工具。
URL:https://github.com/Un1kTeam/Un1kPoc
标签:#漏洞POC
GitHub
GitHub - h4ckdepy/Un1kPoc: 非常专业的漏洞POC管理、团队授权化漏洞管理、漏洞验证利用、漏洞批量利用框架。
非常专业的漏洞POC管理、团队授权化漏洞管理、漏洞验证利用、漏洞批量利用框架。. Contribute to h4ckdepy/Un1kPoc development by creating an account on GitHub.
👍2
GitHub监控消息提醒!!!
更新了:漏洞EXP
描述:a exp about upload bug in order to bypass Header checksum.一个关于上传漏洞绕过文件头校验的利用工具
URL:https://github.com/youyou-pm10/upload-exp
标签:#漏洞EXP
更新了:漏洞EXP
描述:a exp about upload bug in order to bypass Header checksum.一个关于上传漏洞绕过文件头校验的利用工具
URL:https://github.com/youyou-pm10/upload-exp
标签:#漏洞EXP
GitHub
GitHub - youyou-pm10/upload-exp: a exp about upload bug in order to bypass Header checksum.一个关于上传漏洞绕过文件头校验的利用工具
a exp about upload bug in order to bypass Header checksum.一个关于上传漏洞绕过文件头校验的利用工具 - youyou-pm10/upload-exp
👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Powertek PDU身份绕过
URL:https://github.com/Henry4E36/CVE-2022-33174
标签:#CVE-2022
更新了:CVE-2022
描述:Powertek PDU身份绕过
URL:https://github.com/Henry4E36/CVE-2022-33174
标签:#CVE-2022
GitHub
GitHub - Henry4E36/CVE-2022-33174: Powertek PDU身份绕过
Powertek PDU身份绕过. Contribute to Henry4E36/CVE-2022-33174 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload
URL:https://github.com/hosch3n/FastjsonVulns
标签:#CVE-2022
更新了:CVE-2022
描述:[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload
URL:https://github.com/hosch3n/FastjsonVulns
标签:#CVE-2022
GitHub
GitHub - hosch3n/FastjsonVulns: [fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload
[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload - hosch3n/FastjsonVulns
👍1
😁2👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Zabbix-SAML-Bypass: CVE-2022-23131
URL:https://github.com/Vulnmachines/Zabbix-CVE-2022-23131
标签:#CVE-2022
更新了:CVE-2022
描述:Zabbix-SAML-Bypass: CVE-2022-23131
URL:https://github.com/Vulnmachines/Zabbix-CVE-2022-23131
标签:#CVE-2022
GitHub
GitHub - Vulnmachines/Zabbix-CVE-2022-23131: Zabbix-SAML-Bypass: CVE-2022-23131
Zabbix-SAML-Bypass: CVE-2022-23131. Contribute to Vulnmachines/Zabbix-CVE-2022-23131 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:免杀
描述:ShellCode_Loader - Msf&CobaltStrike免杀ShellCode加载器、Shellcode_encryption - 免杀Shellcode加密生成工具,目前测试免杀360&火绒&电脑管家&Windows Defender(其他杀软未测试)。
URL:https://github.com/Axx8/ShellCode_Loader
标签:#免杀
更新了:免杀
描述:ShellCode_Loader - Msf&CobaltStrike免杀ShellCode加载器、Shellcode_encryption - 免杀Shellcode加密生成工具,目前测试免杀360&火绒&电脑管家&Windows Defender(其他杀软未测试)。
URL:https://github.com/Axx8/ShellCode_Loader
标签:#免杀
GitHub
GitHub - Axx8/ShellCode_Loader: ShellCode_Loader - Msf&CobaltStrike免杀ShellCode加载器、Shellcode_encryption - 免杀Shellcode加密生成工具,目前测…
ShellCode_Loader - Msf&CobaltStrike免杀ShellCode加载器、Shellcode_encryption - 免杀Shellcode加密生成工具,目前测试免杀360&火绒&电脑管家&Windows Defender(其他杀软未测试)。 - Axx8/ShellCode_Loader
GitHub监控消息提醒!!!
更新了:webshell
描述:A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS.
URL:https://github.com/cr1f/P.A.S.-Fork
标签:#webshell
更新了:webshell
描述:A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS.
URL:https://github.com/cr1f/P.A.S.-Fork
标签:#webshell
GitHub
GitHub - cr1f/P.A.S.-Fork: A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting…
A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS. - cr1f/P.A.S.-Fork
👍4🔥1👏1🤩1
GitHub监控消息提醒!!!
更新了:webshell
描述:Yara rule for web threat (webshell, redirector)
URL:https://github.com/farhanfaisal/yararule_web
标签:#webshell
更新了:webshell
描述:Yara rule for web threat (webshell, redirector)
URL:https://github.com/farhanfaisal/yararule_web
标签:#webshell
GitHub
GitHub - farhanfaisal/yararule_web: Yara rule for web threat (webshell, redirector)
Yara rule for web threat (webshell, redirector). Contribute to farhanfaisal/yararule_web development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:红队
描述:检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team battle.
URL:https://github.com/808Mak1r/CEmail
标签:#红队
更新了:红队
描述:检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team battle.
URL:https://github.com/808Mak1r/CEmail
标签:#红队
GitHub
GitHub - 808Mak1r/CEmail: 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox…
检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team battle. - 808Mak1r/CEmail