GitHub监控消息提醒!!!
更新了:webshell
描述:A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS.
URL:https://github.com/cr1f/P.A.S.-Fork
标签:#webshell
更新了:webshell
描述:A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS.
URL:https://github.com/cr1f/P.A.S.-Fork
标签:#webshell
GitHub
GitHub - cr1f/P.A.S.-Fork: A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting…
A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS. - cr1f/P.A.S.-Fork
👍4🔥1👏1🤩1
GitHub监控消息提醒!!!
更新了:webshell
描述:Yara rule for web threat (webshell, redirector)
URL:https://github.com/farhanfaisal/yararule_web
标签:#webshell
更新了:webshell
描述:Yara rule for web threat (webshell, redirector)
URL:https://github.com/farhanfaisal/yararule_web
标签:#webshell
GitHub
GitHub - farhanfaisal/yararule_web: Yara rule for web threat (webshell, redirector)
Yara rule for web threat (webshell, redirector). Contribute to farhanfaisal/yararule_web development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:红队
描述:检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team battle.
URL:https://github.com/808Mak1r/CEmail
标签:#红队
更新了:红队
描述:检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team battle.
URL:https://github.com/808Mak1r/CEmail
标签:#红队
GitHub
GitHub - 808Mak1r/CEmail: 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox…
检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team battle. - 808Mak1r/CEmail
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/JHKLing/Red-VS-Blue-Project
标签:#Red Team
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/JHKLing/Red-VS-Blue-Project
标签:#Red Team
GitHub
GitHub - JHKLing/Red-VS-Blue-Project: In this project, you will work on a Red Team vs. Blue Team scenario in which you will play…
In this project, you will work on a Red Team vs. Blue Team scenario in which you will play the role of both pentester and SOC analyst. As the Red Team, you will attack a vulnerable VM within your e...
GitHub监控消息提醒!!!
更新了:漏洞POC
描述:(持续更新)对网上出现的各种OA、中间件、CMS等漏洞进行整理,主要包括漏洞介绍、漏洞影响版本以及漏洞POC/EXP等,并且会持续更新。
URL:https://github.com/zangcc/Aazhen-RexHa
标签:#漏洞POC
更新了:漏洞POC
描述:(持续更新)对网上出现的各种OA、中间件、CMS等漏洞进行整理,主要包括漏洞介绍、漏洞影响版本以及漏洞POC/EXP等,并且会持续更新。
URL:https://github.com/zangcc/Aazhen-RexHa
标签:#漏洞POC
GitHub
GitHub - zangcc/Aazhen-RexHa: 自研JavaFX图形化漏洞扫描工具,支持扫描的漏洞分别是: ThinkPHP-2.x-RCE, ThinkPHP-5.0.23-RCE, ThinkPHP5.0.x-5.0.23通杀RCE, ThinkPHP5…
自研JavaFX图形化漏洞扫描工具,支持扫描的漏洞分别是: ThinkPHP-2.x-RCE, ThinkPHP-5.0.23-RCE, ThinkPHP5.0.x-5.0.23通杀RCE, ThinkPHP5-SQL注入&敏感信息泄露, ThinkPHP 3.x 日志泄露NO.1, ThinkPHP 3.x 日志泄露NO.2, ThinkPHP 5.x 数据库信息泄露的漏洞...
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:This project includes a python script which generates malicious commands leveraging CVE-2022-42889 vulnerability
URL:https://github.com/stavrosgns/Text4ShellPayloads
标签:#CVE-2022
更新了:CVE-2022
描述:This project includes a python script which generates malicious commands leveraging CVE-2022-42889 vulnerability
URL:https://github.com/stavrosgns/Text4ShellPayloads
标签:#CVE-2022
GitHub
GitHub - stavrosgns/Text4ShellPayloads: This project includes a python script which generates malicious commands leveraging CVE…
This project includes a python script which generates malicious commands leveraging CVE-2022-42889 vulnerability - stavrosgns/Text4ShellPayloads
👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:A simple application that shows how to exploit the CVE-2022-42889 vulnerability
URL:https://github.com/korteke/CVE-2022-42889-POC
标签:#CVE-2022
更新了:CVE-2022
描述:A simple application that shows how to exploit the CVE-2022-42889 vulnerability
URL:https://github.com/korteke/CVE-2022-42889-POC
标签:#CVE-2022
GitHub
GitHub - korteke/CVE-2022-42889-POC: A simple application that shows how to exploit the CVE-2022-42889 vulnerability
A simple application that shows how to exploit the CVE-2022-42889 vulnerability - korteke/CVE-2022-42889-POC
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-42889-POC_TEXT4SHELL
URL:https://github.com/jayaram-yalla/CVE-2022-42889-POC_TEXT4SHELL
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-42889-POC_TEXT4SHELL
URL:https://github.com/jayaram-yalla/CVE-2022-42889-POC_TEXT4SHELL
标签:#CVE-2022
GitHub
GitHub - jayaram-yalla/CVE-2022-42889-POC_TEXT4SHELL: CVE-2022-42889-POC_TEXT4SHELL
CVE-2022-42889-POC_TEXT4SHELL. Contribute to jayaram-yalla/CVE-2022-42889-POC_TEXT4SHELL development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:免杀
描述:Python Shellcode 免杀加载器 支持图形化伪装开发
URL:https://github.com/iloveflag/PythonShellcodeLoader
标签:#免杀
更新了:免杀
描述:Python Shellcode 免杀加载器 支持图形化伪装开发
URL:https://github.com/iloveflag/PythonShellcodeLoader
标签:#免杀
GitHub
GitHub - iloveflag/PythonShellcodeLoader: Python Shellcode 免杀加载器 支持图形化定制开发✌
Python Shellcode 免杀加载器 支持图形化定制开发✌. Contribute to iloveflag/PythonShellcodeLoader development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:writeup and PoC for (CVE-2022-41082/CVE-2022-41040) aka ProxyNotShell
URL:https://github.com/stat1st1c/CVE-2022-41082-RCE-POC
标签:#CVE-2022
更新了:CVE-2022
描述:writeup and PoC for (CVE-2022-41082/CVE-2022-41040) aka ProxyNotShell
URL:https://github.com/stat1st1c/CVE-2022-41082-RCE-POC
标签:#CVE-2022
👍1
GitHub监控消息提醒!!!
更新了:渗透测试
描述:自学dos命令及Windows相关安全服务内容,包含简单病毒及简单渗透测试
URL:https://github.com/AlphaXiao/CTF-Windows-Security
标签:#渗透测试
更新了:渗透测试
描述:自学dos命令及Windows相关安全服务内容,包含简单病毒及简单渗透测试
URL:https://github.com/AlphaXiao/CTF-Windows-Security
标签:#渗透测试
GitHub
GitHub - AlphaXiao/CTF-Windows-Security: 自学dos命令及Windows相关安全服务内容,包含简单病毒及简单渗透测试
自学dos命令及Windows相关安全服务内容,包含简单病毒及简单渗透测试. Contribute to AlphaXiao/CTF-Windows-Security development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:《Python渗透测试编程技术:方法与实践》李华峰
URL:https://github.com/bsshor/Book-Python-Penetration-Test-Programming-Techniques
标签:#渗透测试
更新了:渗透测试
描述:《Python渗透测试编程技术:方法与实践》李华峰
URL:https://github.com/bsshor/Book-Python-Penetration-Test-Programming-Techniques
标签:#渗透测试
GitHub
GitHub - bsshor/Book-Python-Penetration-Test-Programming-Techniques: 《Python渗透测试编程技术:方法与实践》李华峰
《Python渗透测试编程技术:方法与实践》李华峰. Contribute to bsshor/Book-Python-Penetration-Test-Programming-Techniques development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.
URL:https://github.com/akshayithape-devops/CVE-2022-42889-POC
标签:#CVE-2022
更新了:CVE-2022
描述:A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.
URL:https://github.com/akshayithape-devops/CVE-2022-42889-POC
标签:#CVE-2022
GitHub
GitHub - akshayithape-devops/CVE-2022-42889-POC: A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.
A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability. - akshayithape-devops/CVE-2022-42889-POC
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.
URL:https://github.com/0xmaximus/Apache-Commons-Text-CVE-2022-42889
标签:#CVE-2022
更新了:CVE-2022
描述:A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.
URL:https://github.com/0xmaximus/Apache-Commons-Text-CVE-2022-42889
标签:#CVE-2022
GitHub
GitHub - 0xmaximus/Apache-Commons-Text-CVE-2022-42889: Apache Text4Shell (CVE-2022-42889) Burp Bounty Profile
Apache Text4Shell (CVE-2022-42889) Burp Bounty Profile - GitHub - 0xmaximus/Apache-Commons-Text-CVE-2022-42889: Apache Text4Shell (CVE-2022-42889) Burp Bounty Profile
👍1
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot saved to disk as a file.
URL:https://github.com/CodeXTF2/ScreenshotBOF
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot saved to disk as a file.
URL:https://github.com/CodeXTF2/ScreenshotBOF
标签:#Cobalt Strike
GitHub
GitHub - CodeXTF2/ScreenshotBOF: An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a…
An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory. - CodeXTF2/ScreenshotBOF