GitHub监控消息提醒!!!
更新了:渗透测试
描述:领创(linspirer)和龙之门爱学(etiantian)渗透测试公开信息
URL:https://github.com/ljy-002/Linspirer-Etiantian-Examcloud.exploit
标签:#渗透测试
更新了:渗透测试
描述:领创(linspirer)和龙之门爱学(etiantian)渗透测试公开信息
URL:https://github.com/ljy-002/Linspirer-Etiantian-Examcloud.exploit
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-25765 pdfkit <0.8.6 command injection.
URL:https://github.com/shamo0/PDFkit-CMD-Injection
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-25765 pdfkit <0.8.6 command injection.
URL:https://github.com/shamo0/PDFkit-CMD-Injection
标签:#CVE-2022
GitHub
GitHub - shamo0/PDFkit-CMD-Injection: CVE-2022-25765 pdfkit <0.8.6 command injection.
CVE-2022-25765 pdfkit <0.8.6 command injection. Contribute to shamo0/PDFkit-CMD-Injection development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.
URL:https://github.com/Conradoduart3/Nft-Grabber-Stealer-Exploit-Cve-2022-Steal-BlockHain-Hack-Nft
标签:#CVE-2022
更新了:CVE-2022
描述:Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.
URL:https://github.com/Conradoduart3/Nft-Grabber-Stealer-Exploit-Cve-2022-Steal-BlockHain-Hack-Nft
标签:#CVE-2022
GitHub监控消息提醒!!!
更新了:Red Team
描述:A small Aggressor script to help Red Teams identify foreign processes on a host machine
URL:https://github.com/Octoberfest7/Cohab_Processes
标签:#Red Team
更新了:Red Team
描述:A small Aggressor script to help Red Teams identify foreign processes on a host machine
URL:https://github.com/Octoberfest7/Cohab_Processes
标签:#Red Team
GitHub
GitHub - Octoberfest7/Cohab_Processes: A small Aggressor script to help Red Teams identify foreign processes on a host machine
A small Aggressor script to help Red Teams identify foreign processes on a host machine - Octoberfest7/Cohab_Processes
👍1
GitHub监控消息提醒!!!
更新了:红队
描述:cscan-go 版本,主要用于信息收集、红队横向渗透等...(相信我,点进来不会后悔的!)
URL:https://github.com/ifacker/cscan-go
标签:#红队
更新了:红队
描述:cscan-go 版本,主要用于信息收集、红队横向渗透等...(相信我,点进来不会后悔的!)
URL:https://github.com/ifacker/cscan-go
标签:#红队
GitHub
GitHub - ifacker/cscan-go: cscan-go 版本,主要用于C段扫描,信息收集、红队横向渗透等...(相信我,点进来不会后悔的!)
cscan-go 版本,主要用于C段扫描,信息收集、红队横向渗透等...(相信我,点进来不会后悔的!) - ifacker/cscan-go
😁1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
URL:https://github.com/Live-Hack-CVE/CVE-2022-20607
标签:#CVE-2022
更新了:CVE-2022
描述:TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
URL:https://github.com/Live-Hack-CVE/CVE-2022-20607
标签:#CVE-2022
👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
URL:https://github.com/Live-Hack-CVE/CVE-2022-4646
标签:#CVE-2022
更新了:CVE-2022
描述:TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
URL:https://github.com/Live-Hack-CVE/CVE-2022-4646
标签:#CVE-2022
👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:PoC for the CVE-2022-41082 Vulnerability Effecting Microsoft Exchange Servers
URL:https://github.com/balki97/CVE-2022-41082-POC
标签:#CVE-2022
更新了:CVE-2022
描述:PoC for the CVE-2022-41082 Vulnerability Effecting Microsoft Exchange Servers
URL:https://github.com/balki97/CVE-2022-41082-POC
标签:#CVE-2022
GitHub
GitHub - balki97/OWASSRF-CVE-2022-41082-POC: PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting…
PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers - GitHub - balki97/OWASSRF-CVE-2022-41082-POC: PoC for the CVE-2022-41080 , CVE-2...
GitHub监控消息提醒!!!
更新了:钓鱼
描述:TiddlyWiki简易指南之墨屉钓鱼版
URL:https://github.com/tiddly-gittly/TiddlyWiki-Easy-Guide-to-TiddlyMemo-Fishing-Edition
标签:#钓鱼
更新了:钓鱼
描述:TiddlyWiki简易指南之墨屉钓鱼版
URL:https://github.com/tiddly-gittly/TiddlyWiki-Easy-Guide-to-TiddlyMemo-Fishing-Edition
标签:#钓鱼
👍1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-2602
URL:https://github.com/Live-Hack-CVE/CVE-2022-4633
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-2602
URL:https://github.com/Live-Hack-CVE/CVE-2022-4633
标签:#CVE-2022
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
URL:https://github.com/Live-Hack-CVE/CVE-2022-25574
标签:#CVE-2022
更新了:CVE-2022
描述:TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
URL:https://github.com/Live-Hack-CVE/CVE-2022-25574
标签:#CVE-2022
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM
URL:https://github.com/Live-Hack-CVE/CVE-2022-36966
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM
URL:https://github.com/Live-Hack-CVE/CVE-2022-36966
标签:#CVE-2022
GitHub监控消息提醒!!!
更新了:Red Team
描述:-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams
URL:https://github.com/vaelwolf/CVE-2022-1388
标签:#Red Team
更新了:Red Team
描述:-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams
URL:https://github.com/vaelwolf/CVE-2022-1388
标签:#Red Team
GitHub
GitHub - vaelwolf/CVE-2022-1388: -- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality…
-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams - vaelwolf/CVE-2022-1388
👍1
GitHub监控消息提醒!!!
更新了:绕过
描述:网络安全学习wiki,包括Web安全、内网安全、云安全、免杀绕过等(持续更新)
URL:https://github.com/zhengthirteen/-Image-convolution
标签:#绕过
更新了:绕过
描述:网络安全学习wiki,包括Web安全、内网安全、云安全、免杀绕过等(持续更新)
URL:https://github.com/zhengthirteen/-Image-convolution
标签:#绕过
GitHub
GitHub - zhengthirteen/-Image-convolution: 图像可以用一个整数二维矩阵表示。图像卷积操作,或称为核操作,是进行图像处理的一种常用手段,图像卷积操作的目的是利用像素点和其邻域像素之前的空间关系,通过加权求和的操作…
图像可以用一个整数二维矩阵表示。图像卷积操作,或称为核操作,是进行图像处理的一种常用手段,图像卷积操作的目的是利用像素点和其邻域像素之前的空间关系,通过加权求和的操作,实现模糊,锐化,边缘检测等功能。图像卷积的计算过程就是卷积核按步长对图像局部像素块进行加权求和的过程。 卷积核是一个m*m大小的矩阵 (m是奇数) 步骤: 1)将核围绕中心旋转180度(注意,非上下颠倒) 2)滑动核,...
GitHub监控消息提醒!!!
更新了:Red Team
描述:-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams
URL:https://github.com/Ignitetechnologies/Credential-Dumping
标签:#Red Team
更新了:Red Team
描述:-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams
URL:https://github.com/Ignitetechnologies/Credential-Dumping
标签:#Red Team
GitHub
GitHub - Ignitetechnologies/Credential-Dumping: This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals…
This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential Access) with examples. There are multiple ways to perform the...
👍1
GitHub监控消息提醒!!!
更新了:绕过
描述:解决一些软件在绕过中国大陆规则中依然会显示当前IP在国外
URL:https://github.com/kivvi3412/Mainland_China_Rules_List
标签:#绕过
更新了:绕过
描述:解决一些软件在绕过中国大陆规则中依然会显示当前IP在国外
URL:https://github.com/kivvi3412/Mainland_China_Rules_List
标签:#绕过
GitHub
GitHub - kivvi3412/Mainland_China_Rules_List: 解决一些软件在绕过中国大陆规则中依然会显示当前IP在国外
解决一些软件在绕过中国大陆规则中依然会显示当前IP在国外. Contribute to kivvi3412/Mainland_China_Rules_List development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-26134 GO POC 练习
URL:https://github.com/wjlin0/CVE-2022-26134
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-26134 GO POC 练习
URL:https://github.com/wjlin0/CVE-2022-26134
标签:#CVE-2022
GitHub
GitHub - wjlin0/CVE-2022-26134: CVE-2022-26134 GO POC 练习
CVE-2022-26134 GO POC 练习. Contribute to wjlin0/CVE-2022-26134 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
URL:https://github.com/zhuowei/WDBFontOverwrite
标签:#CVE-2022
更新了:CVE-2022
描述:Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
URL:https://github.com/zhuowei/WDBFontOverwrite
标签:#CVE-2022
GitHub
GitHub - ginsudev/WDBFontOverwrite: Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689. - ginsudev/WDBFontOverwrite