GitHub监控消息提醒!!!
更新了:内存马
描述:红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具
URL:https://github.com/Ricehahaa/seckeySystem
标签:#内存马
更新了:内存马
描述:红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具
URL:https://github.com/Ricehahaa/seckeySystem
标签:#内存马
GitHub
GitHub - Ricehahaa/seckeySystem: 一个几年前黑马的小项目(密钥协商系统),但当时的一些其他功能没实现,这里把剩下的功能都实现了(当然代码是在原有基础上扩展的再加修改些许bug)用到的主要技术有连接池,多线程,网络通信,A…
一个几年前黑马的小项目(密钥协商系统),但当时的一些其他功能没实现,这里把剩下的功能都实现了(当然代码是在原有基础上扩展的再加修改些许bug)用到的主要技术有连接池,多线程,网络通信,ASN.1报文编解码,工厂模式,共享内存,利用openssl库里的加密算法进行加密,最后还有常用MYSQL的API接口(原项目是oracle的,但是虚拟机上没装,但其实都一样😅)。项目整体不难,可以拿来巩固大家...
GitHub监控消息提醒!!!
更新了:Red Team
描述:An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join.
URL:https://github.com/SNU-Red-Team/.github
标签:#Red Team
更新了:Red Team
描述:An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join.
URL:https://github.com/SNU-Red-Team/.github
标签:#Red Team
GitHub
GitHub - SNUC-Zero-Day/.github: An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills…
An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join. - SNUC-Zero-Day/.github
GitHub监控消息提醒!!!
更新了:Red Team
描述:An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join.
URL:https://github.com/SNU-Red-Force/.github
标签:#Red Team
更新了:Red Team
描述:An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join.
URL:https://github.com/SNU-Red-Force/.github
标签:#Red Team
GitHub
GitHub - SNU-Red-Force/.github: An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills…
An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join. - GitHub - SNU-Red-Force/.github: An Introductory Repository for SNU Red Team. Thi...
👍1
GitHub监控消息提醒!!!
更新了:bypass av
描述:免杀 defender 360 cobalstrike shellcode
URL:https://github.com/screetsec/TheFatRat
标签:#bypass av
更新了:bypass av
描述:免杀 defender 360 cobalstrike shellcode
URL:https://github.com/screetsec/TheFatRat
标签:#bypass av
GitHub
GitHub - screetsec/TheFatRat: Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation…
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th...
GitHub监控消息提醒!!!
更新了:免杀
描述:将shellcode转换特殊的数据类型,用于过静态免杀
URL:https://github.com/GPiiiiii/SpecialShellcode
标签:#免杀
更新了:免杀
描述:将shellcode转换特殊的数据类型,用于过静态免杀
URL:https://github.com/GPiiiiii/SpecialShellcode
标签:#免杀
GitHub
GitHub - GPiiiiii/SpecialShellcode: 将shellcode转换特殊的数据类型,用于过静态免杀
将shellcode转换特殊的数据类型,用于过静态免杀. Contribute to GPiiiiii/SpecialShellcode development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.
URL:https://github.com/CodeXTF2/ScreenshotBOF
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.
URL:https://github.com/CodeXTF2/ScreenshotBOF
标签:#Cobalt Strike
GitHub
GitHub - CodeXTF2/ScreenshotBOF: An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a…
An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory. - CodeXTF2/ScreenshotBOF
GitHub监控消息提醒!!!
更新了:Red Team
描述:Strategy for building a Red Team
URL:https://github.com/sneakerhax/Genesis
标签:#Red Team
更新了:Red Team
描述:Strategy for building a Red Team
URL:https://github.com/sneakerhax/Genesis
标签:#Red Team
GitHub
GitHub - sneakerhax/Genesis: Strategy for building a Red Team
Strategy for building a Red Team. Contribute to sneakerhax/Genesis development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:PoC for CVE-2021-31166 and CVE-2022-21907
URL:https://github.com/0xmaximus/Home-Demolisher
标签:#CVE-2022
更新了:CVE-2022
描述:PoC for CVE-2021-31166 and CVE-2022-21907
URL:https://github.com/0xmaximus/Home-Demolisher
标签:#CVE-2022
GitHub
GitHub - 0xmaximus/Home-Demolisher: PoC for CVE-2021-31166 and CVE-2022-21907
PoC for CVE-2021-31166 and CVE-2022-21907. Contribute to 0xmaximus/Home-Demolisher development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:A library of Go functions for use on the Synack Red Team platform.
URL:https://github.com/un4gi/synacklib
标签:#Red Team
更新了:Red Team
描述:A library of Go functions for use on the Synack Red Team platform.
URL:https://github.com/un4gi/synacklib
标签:#Red Team
🥰1
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:一款内网快速打点的辅助性扫描工具,方便红队人员在内网横向移动前期的信息搜集、漏洞探测利用环节的工作开展。其工具特性主要为支持一键化三个档位的便捷式信息与漏洞扫描或每个功能模块单独式扫描探测功能。
URL:https://github.com/sh1yan/Lscan
标签:#漏洞利用
更新了:漏洞利用
描述:一款内网快速打点的辅助性扫描工具,方便红队人员在内网横向移动前期的信息搜集、漏洞探测利用环节的工作开展。其工具特性主要为支持一键化三个档位的便捷式信息与漏洞扫描或每个功能模块单独式扫描探测功能。
URL:https://github.com/sh1yan/Lscan
标签:#漏洞利用
GitHub
GitHub - sh1yan/Lscan: 一款内网快速打点的辅助性扫描工具,方便红队人员在内网横向移动前期的信息搜集、漏洞探测利用环节的工作开展。其工具特性主要为支持一键化三个档位的便捷式信息与漏洞扫描或每个功能模块单独式扫描探测功能。
一款内网快速打点的辅助性扫描工具,方便红队人员在内网横向移动前期的信息搜集、漏洞探测利用环节的工作开展。其工具特性主要为支持一键化三个档位的便捷式信息与漏洞扫描或每个功能模块单独式扫描探测功能。 - sh1yan/Lscan
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Projects & Materials
URL:https://github.com/ziggoon/red-team
标签:#Red Team
更新了:Red Team
描述:Red Team Projects & Materials
URL:https://github.com/ziggoon/red-team
标签:#Red Team
👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:A Zeek CVE-2022-24491 detector.
URL:https://github.com/corelight/CVE-2022-24491
标签:#CVE-2022
更新了:CVE-2022
描述:A Zeek CVE-2022-24491 detector.
URL:https://github.com/corelight/CVE-2022-24491
标签:#CVE-2022
GitHub
GitHub - corelight/CVE-2022-24491: A Zeek CVE-2022-24491 detector.
A Zeek CVE-2022-24491 detector. Contribute to corelight/CVE-2022-24491 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:免杀
描述:powershell免杀混淆器,简单有效。A simple and effective powershell obfuscaiton tool bypass Anti-Virus
URL:https://github.com/H4de5-7/powershell-obfuscation
标签:#免杀
更新了:免杀
描述:powershell免杀混淆器,简单有效。A simple and effective powershell obfuscaiton tool bypass Anti-Virus
URL:https://github.com/H4de5-7/powershell-obfuscation
标签:#免杀
🥰1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:writeup and PoC for (CVE-2022-41082/CVE-2022-41040) aka ProxyNotShell
URL:https://github.com/Adynervi/CVE-2022-41082-RCE-PoC
标签:#CVE-2022
更新了:CVE-2022
描述:writeup and PoC for (CVE-2022-41082/CVE-2022-41040) aka ProxyNotShell
URL:https://github.com/Adynervi/CVE-2022-41082-RCE-PoC
标签:#CVE-2022
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:Gopherus的Go语言实现,解决SSRF漏洞利用中gopher协议转换问题
URL:https://github.com/evilAdan0s/GopherGo
标签:#漏洞利用
更新了:漏洞利用
描述:Gopherus的Go语言实现,解决SSRF漏洞利用中gopher协议转换问题
URL:https://github.com/evilAdan0s/GopherGo
标签:#漏洞利用
GitHub
GitHub - evilAdan0s/GopherGo: Gopherus的Go语言实现,解决SSRF漏洞利用中gopher协议转换问题
Gopherus的Go语言实现,解决SSRF漏洞利用中gopher协议转换问题. Contribute to evilAdan0s/GopherGo development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Python Exploit for CVE-2022-0739
URL:https://github.com/BKreisel/CVE-2022-0739
标签:#CVE-2022
更新了:CVE-2022
描述:Python Exploit for CVE-2022-0739
URL:https://github.com/BKreisel/CVE-2022-0739
标签:#CVE-2022
GitHub
GitHub - BKreisel/CVE-2022-0739: 🐍 Python Exploit for CVE-2022-0739
🐍 Python Exploit for CVE-2022-0739. Contribute to BKreisel/CVE-2022-0739 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass av
描述:整理收集的二进制文件免杀处理各种方法和姿势
URL:https://github.com/23jdn/Bypass_Av_Mind_Mapping
标签:#bypass av
更新了:bypass av
描述:整理收集的二进制文件免杀处理各种方法和姿势
URL:https://github.com/23jdn/Bypass_Av_Mind_Mapping
标签:#bypass av
👍1