GitHub监控消息提醒!!!
更新了:CVE-2021
描述:NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972
URL:https://github.com/psc4re/NSE-scripts
更新了:CVE-2021
描述:NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972
URL:https://github.com/psc4re/NSE-scripts
GitHub
GitHub - psc4re/NSE-scripts: NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell…
NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473 - psc4re/NSE-scripts
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
URL:https://github.com/boku7/injectAmsiBypass
更新了:Cobalt Strike
描述:Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
URL:https://github.com/boku7/injectAmsiBypass
GitHub
GitHub - boku7/injectAmsiBypass: Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.
Cobalt Strike BOF - Bypass AMSI in a remote process with code injection. - boku7/injectAmsiBypass
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Basic TCP channel integrated into Cobalt Strike to use as a starting point for developing External C2 covert channels.
URL:https://github.com/fitzgeralddaniel/Base_Covert_Channel
更新了:Cobalt Strike
描述:Basic TCP channel integrated into Cobalt Strike to use as a starting point for developing External C2 covert channels.
URL:https://github.com/fitzgeralddaniel/Base_Covert_Channel
GitHub
GitHub - fitzgeralddaniel/Base_Covert_Channel: Basic TCP & UDP channel integrated into Cobalt Strike to use as a starting point…
Basic TCP & UDP channel integrated into Cobalt Strike to use as a starting point for developing External C2 covert channels. - GitHub - fitzgeralddaniel/Base_Covert_Channel: Basic TCP &...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
URL:https://github.com/DamonMohammadbagher/Some_Pentesters_SecurityResearchers_RedTeamers
更新了:Red Team
描述:Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
URL:https://github.com/DamonMohammadbagher/Some_Pentesters_SecurityResearchers_RedTeamers
GitHub
GitHub - DamonMohammadbagher/Some_Pentesters_SecurityResearchers_RedTeamers: Some Pentesters, Security Researchers, Red Teamers…
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot... - DamonMohammadbagher/Some_Pentesters_SecurityResearchers_RedTeamers
GitHub监控消息提醒!!!
更新了:Red Team
描述:Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
URL:https://github.com/mgeeky/RedWarden
更新了:Red Team
描述:Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
URL:https://github.com/mgeeky/RedWarden
GitHub
GitHub - mgeeky/RedWarden: Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection…
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation - mgeeky/RedWarden
GitHub监控消息提醒!!!
更新了:Red Team
描述:The source code of the DEF CON Red Team Offense Village website
URL:https://github.com/red-team-offense-village/redteamvillage_website
更新了:Red Team
描述:The source code of the DEF CON Red Team Offense Village website
URL:https://github.com/red-team-offense-village/redteamvillage_website
GitHub
GitHub - red-team-offense-village/redteamvillage_website: The source code of the DEF CON Red Team Offense Village website
The source code of the DEF CON Red Team Offense Village website - GitHub - red-team-offense-village/redteamvillage_website: The source code of the DEF CON Red Team Offense Village website
GitHub监控消息提醒!!!
更新了:免杀
描述:远控免杀系列文章及配套工具,汇总测试了互联网上的几十种免杀工具、113种白名单免杀方式、8种代码编译免杀、若干免杀实战技术,并对免杀效果进行了一一测试,为远控的免杀和杀软对抗免杀提供参考。
URL:https://github.com/TideSec/BypassAntiVirus
更新了:免杀
描述:远控免杀系列文章及配套工具,汇总测试了互联网上的几十种免杀工具、113种白名单免杀方式、8种代码编译免杀、若干免杀实战技术,并对免杀效果进行了一一测试,为远控的免杀和杀软对抗免杀提供参考。
URL:https://github.com/TideSec/BypassAntiVirus
GitHub
GitHub - TideSec/BypassAntiVirus: 远控免杀系列文章及配套工具,汇总测试了互联网上的几十种免杀工具、113种白名单免杀方式、8种代码编译免杀、若干免杀实战技术,并对免杀效果进行了一一测试,为远控的免杀和杀软对抗免杀提供参考。
远控免杀系列文章及配套工具,汇总测试了互联网上的几十种免杀工具、113种白名单免杀方式、8种代码编译免杀、若干免杀实战技术,并对免杀效果进行了一一测试,为远控的免杀和杀软对抗免杀提供参考。 - TideSec/BypassAntiVirus
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
URL:https://github.com/mgeeky/cobalt-arsenal
更新了:Cobalt Strike
描述:My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
URL:https://github.com/mgeeky/cobalt-arsenal
GitHub
GitHub - mgeeky/cobalt-arsenal: My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+ - mgeeky/cobalt-arsenal
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Mind Map
URL:https://github.com/mgeeky/Penetration-Testing-Tools
更新了:Red Team
描述:Red Team Mind Map
URL:https://github.com/mgeeky/Penetration-Testing-Tools
GitHub
GitHub - mgeeky/Penetration-Testing-Tools: A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've…
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes. - mgeeky/Penetration-Testing-Tools
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:[CVE-2021-22123] Fortinet FortiWeb Authenticated OS Command Injection
URL:https://github.com/murataydemir/CVE-2021-22123
更新了:CVE-2021
描述:[CVE-2021-22123] Fortinet FortiWeb Authenticated OS Command Injection
URL:https://github.com/murataydemir/CVE-2021-22123
GitHub
GitHub - murataydemir/CVE-2021-22123: [CVE-2021-22123] Fortinet FortiWeb Authenticated OS Command Injection
[CVE-2021-22123] Fortinet FortiWeb Authenticated OS Command Injection - murataydemir/CVE-2021-22123
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
URL:https://github.com/Tylous/SourcePoint
更新了:Cobalt Strike
描述:SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
URL:https://github.com/Tylous/SourcePoint
GitHub
GitHub - Tylous/SourcePoint: SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure…
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion. - Tylous/SourcePoint
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Cobalt Strike < 4.4 dos CVE-2021-36798
URL:https://github.com/M-Kings/CVE-2021-36798-
更新了:CVE-2021
描述:Cobalt Strike < 4.4 dos CVE-2021-36798
URL:https://github.com/M-Kings/CVE-2021-36798-
GitHub
GitHub - M-Kings/CVE-2021-36798: Cobalt Strike < 4.4 dos CVE-2021-36798
Cobalt Strike < 4.4 dos CVE-2021-36798 . Contribute to M-Kings/CVE-2021-36798 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike < 4.4 dos CVE-2021-36798
URL:https://github.com/M-Kings/CVE-2021-36798
更新了:Cobalt Strike
描述:Cobalt Strike < 4.4 dos CVE-2021-36798
URL:https://github.com/M-Kings/CVE-2021-36798
GitHub
GitHub - M-Kings/CVE-2021-36798: Cobalt Strike < 4.4 dos CVE-2021-36798
Cobalt Strike < 4.4 dos CVE-2021-36798 . Contribute to M-Kings/CVE-2021-36798 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红队
描述::cat2:Medusa是一个红队武器库平台,目前包括XSS平台、协同平台、CVE监控、免杀生成、DNSLOG、钓鱼邮件等功能,持续开发中
URL:https://github.com/gege-circle/home
更新了:红队
描述::cat2:Medusa是一个红队武器库平台,目前包括XSS平台、协同平台、CVE监控、免杀生成、DNSLOG、钓鱼邮件等功能,持续开发中
URL:https://github.com/gege-circle/home
GitHub
GitHub - gege-circle/home: 这里是GitHub的草场,也是戈戈圈爱好者的交流地,主要讨论动漫、游戏、科技、人文、生活等所有话题,欢迎各位小伙伴们在此讨论趣事。This is GitHub grassland, and the community…
这里是GitHub的草场,也是戈戈圈爱好者的交流地,主要讨论动漫、游戏、科技、人文、生活等所有话题,欢迎各位小伙伴们在此讨论趣事。This is GitHub grassland, and the community place for Gege circle lovers, mainly discusses anime, games, technology, lifing and othe...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Proof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893.
URL:https://github.com/ZephrFish/CVE-2021-22893
更新了:CVE-2021
描述:Proof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893.
URL:https://github.com/ZephrFish/CVE-2021-22893
GitHub
GitHub - ZephrFish/CVE-2021-22893_HoneyPoC2: DO NOT RUN THIS.
DO NOT RUN THIS. Contribute to ZephrFish/CVE-2021-22893_HoneyPoC2 development by creating an account on GitHub.