GitHub监控消息提醒!!!
更新了:CVE-2022
描述:TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
URL:https://github.com/Live-Hack-CVE/CVE-2022-25574
标签:#CVE-2022
更新了:CVE-2022
描述:TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
URL:https://github.com/Live-Hack-CVE/CVE-2022-25574
标签:#CVE-2022
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM
URL:https://github.com/Live-Hack-CVE/CVE-2022-36966
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM
URL:https://github.com/Live-Hack-CVE/CVE-2022-36966
标签:#CVE-2022
GitHub监控消息提醒!!!
更新了:Red Team
描述:-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams
URL:https://github.com/vaelwolf/CVE-2022-1388
标签:#Red Team
更新了:Red Team
描述:-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams
URL:https://github.com/vaelwolf/CVE-2022-1388
标签:#Red Team
GitHub
GitHub - vaelwolf/CVE-2022-1388: -- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality…
-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams - vaelwolf/CVE-2022-1388
👍1
GitHub监控消息提醒!!!
更新了:绕过
描述:网络安全学习wiki,包括Web安全、内网安全、云安全、免杀绕过等(持续更新)
URL:https://github.com/zhengthirteen/-Image-convolution
标签:#绕过
更新了:绕过
描述:网络安全学习wiki,包括Web安全、内网安全、云安全、免杀绕过等(持续更新)
URL:https://github.com/zhengthirteen/-Image-convolution
标签:#绕过
GitHub
GitHub - zhengthirteen/-Image-convolution: 图像可以用一个整数二维矩阵表示。图像卷积操作,或称为核操作,是进行图像处理的一种常用手段,图像卷积操作的目的是利用像素点和其邻域像素之前的空间关系,通过加权求和的操作…
图像可以用一个整数二维矩阵表示。图像卷积操作,或称为核操作,是进行图像处理的一种常用手段,图像卷积操作的目的是利用像素点和其邻域像素之前的空间关系,通过加权求和的操作,实现模糊,锐化,边缘检测等功能。图像卷积的计算过程就是卷积核按步长对图像局部像素块进行加权求和的过程。 卷积核是一个m*m大小的矩阵 (m是奇数) 步骤: 1)将核围绕中心旋转180度(注意,非上下颠倒) 2)滑动核,...
GitHub监控消息提醒!!!
更新了:Red Team
描述:-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams
URL:https://github.com/Ignitetechnologies/Credential-Dumping
标签:#Red Team
更新了:Red Team
描述:-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams
URL:https://github.com/Ignitetechnologies/Credential-Dumping
标签:#Red Team
GitHub
GitHub - Ignitetechnologies/Credential-Dumping: This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals…
This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential Access) with examples. There are multiple ways to perform the...
👍1
GitHub监控消息提醒!!!
更新了:绕过
描述:解决一些软件在绕过中国大陆规则中依然会显示当前IP在国外
URL:https://github.com/kivvi3412/Mainland_China_Rules_List
标签:#绕过
更新了:绕过
描述:解决一些软件在绕过中国大陆规则中依然会显示当前IP在国外
URL:https://github.com/kivvi3412/Mainland_China_Rules_List
标签:#绕过
GitHub
GitHub - kivvi3412/Mainland_China_Rules_List: 解决一些软件在绕过中国大陆规则中依然会显示当前IP在国外
解决一些软件在绕过中国大陆规则中依然会显示当前IP在国外. Contribute to kivvi3412/Mainland_China_Rules_List development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-26134 GO POC 练习
URL:https://github.com/wjlin0/CVE-2022-26134
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-26134 GO POC 练习
URL:https://github.com/wjlin0/CVE-2022-26134
标签:#CVE-2022
GitHub
GitHub - wjlin0/CVE-2022-26134: CVE-2022-26134 GO POC 练习
CVE-2022-26134 GO POC 练习. Contribute to wjlin0/CVE-2022-26134 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
URL:https://github.com/zhuowei/WDBFontOverwrite
标签:#CVE-2022
更新了:CVE-2022
描述:Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
URL:https://github.com/zhuowei/WDBFontOverwrite
标签:#CVE-2022
GitHub
GitHub - ginsudev/WDBFontOverwrite: Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.
Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689. - ginsudev/WDBFontOverwrite
GitHub监控消息提醒!!!
更新了:Red Team
描述:Picus Labs Red Team Public Repository
URL:https://github.com/picussecurity/Section9
标签:#Red Team
更新了:Red Team
描述:Picus Labs Red Team Public Repository
URL:https://github.com/picussecurity/Section9
标签:#Red Team
GitHub
GitHub - picussecurity/Section9: Picus Labs Red Team Public Repository
Picus Labs Red Team Public Repository. Contribute to picussecurity/Section9 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:This repo contains payload for the CVE-2022-36067
URL:https://github.com/Prathamrajgor/Exploit-For-CVE-2022-36067
标签:#CVE-2022
更新了:CVE-2022
描述:This repo contains payload for the CVE-2022-36067
URL:https://github.com/Prathamrajgor/Exploit-For-CVE-2022-36067
标签:#CVE-2022
GitHub
GitHub - Prathamrajgor/Exploit-For-CVE-2022-36067: This repo contains payload for the CVE-2022-36067
This repo contains payload for the CVE-2022-36067. Contribute to Prathamrajgor/Exploit-For-CVE-2022-36067 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Proof of concept for CVE-2022-30190 (Follina).
URL:https://github.com/winstxnhdw/CVE-2022-30190
标签:#CVE-2022
更新了:CVE-2022
描述:Proof of concept for CVE-2022-30190 (Follina).
URL:https://github.com/winstxnhdw/CVE-2022-30190
标签:#CVE-2022
GitHub
GitHub - winstxnhdw/CVE-2022-30190: A proof of concept for CVE-2022-30190 (Follina).
A proof of concept for CVE-2022-30190 (Follina). Contribute to winstxnhdw/CVE-2022-30190 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:webshell
描述:webshell的Java实现
URL:https://github.com/pap1rman/webShellJava
标签:#webshell
更新了:webshell
描述:webshell的Java实现
URL:https://github.com/pap1rman/webShellJava
标签:#webshell
GitHub
GitHub - pap1rman/webShellJava: webshell的Java实现
webshell的Java实现. Contribute to pap1rman/webShellJava development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:getshell
描述:WBCE CMS v1.5.4 can implement getshell by modifying the upload file type. CVE project by @Sn0wAlice
URL:https://github.com/Live-Hack-CVE/CVE-2022-46020
标签:#getshell
更新了:getshell
描述:WBCE CMS v1.5.4 can implement getshell by modifying the upload file type. CVE project by @Sn0wAlice
URL:https://github.com/Live-Hack-CVE/CVE-2022-46020
标签:#getshell
GitHub监控消息提醒!!!
更新了:webshell
描述:A polymorphic webshell generator
URL:https://github.com/evaannn/delorean
标签:#webshell
更新了:webshell
描述:A polymorphic webshell generator
URL:https://github.com/evaannn/delorean
标签:#webshell
👍1
GitHub监控消息提醒!!!
更新了:getshell
描述:Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell. CVE project by @Sn0wAlice
URL:https://github.com/Live-Hack-CVE/CVE-2022-44289
标签:#getshell
更新了:getshell
描述:Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell. CVE project by @Sn0wAlice
URL:https://github.com/Live-Hack-CVE/CVE-2022-44289
标签:#getshell
GitHub监控消息提醒!!!
更新了:绕过
描述:为Android 13绕过系统分区的apk签名校验
URL:https://github.com/Weverses/BypassSignCheck
标签:#绕过
更新了:绕过
描述:为Android 13绕过系统分区的apk签名校验
URL:https://github.com/Weverses/BypassSignCheck
标签:#绕过
GitHub
GitHub - Weverses/BypassSignCheck: 为Android 13绕过系统分区的apk签名校验
为Android 13绕过系统分区的apk签名校验. Contribute to Weverses/BypassSignCheck development by creating an account on GitHub.