GitHub监控消息提醒!!!
更新了:webshell
描述:A PHP webshell to use when no exec-like functions is allowed
URL:https://github.com/BorelEnzo/PoisonPrince
标签:#webshell
更新了:webshell
描述:A PHP webshell to use when no exec-like functions is allowed
URL:https://github.com/BorelEnzo/PoisonPrince
标签:#webshell
GitHub
GitHub - BorelEnzo/PoisonPrince: A PHP webshell to use when no exec-like function is allowed
A PHP webshell to use when no exec-like function is allowed - BorelEnzo/PoisonPrince
👍1
GitHub监控消息提醒!!!
更新了:Red Team
描述:S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
URL:https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
标签:#Red Team
更新了:Red Team
描述:S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
URL:https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
标签:#Red Team
GitHub
GitHub - blackhatethicalhacking/SecretOpt1c: SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites…
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy! - blackhatethicalhacking/SecretOpt1c
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
URL:https://github.com/Malwareman007/CVE-2023-21608
标签:#CVE-2023
更新了:CVE-2023
描述:Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
URL:https://github.com/Malwareman007/CVE-2023-21608
标签:#CVE-2023
GitHub
GitHub - Malwareman007/CVE-2023-21608: Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit - Malwareman007/CVE-2023-21608
GitHub监控消息提醒!!!
更新了:钓鱼
描述:对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^▽^*)Setoolkit_CN汉化
URL:https://github.com/light-Life/Setoolkit_CN
标签:#钓鱼
更新了:钓鱼
描述:对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^▽^*)Setoolkit_CN汉化
URL:https://github.com/light-Life/Setoolkit_CN
标签:#钓鱼
GitHub
GitHub - light-Life/Setoolkit_CN: 对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^▽^*)Setoolkit_CN汉化
对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^ ▽^*)Setoolkit_CN汉化 - GitHub - light-Life/Setoolkit_CN: 对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^ ▽^*)Setool...
GitHub监控消息提醒!!!
更新了:代码注入
描述:基于长链接和代码注入的Android private API暴露框架
URL:https://github.com/yint-tech/sekiro-open
标签:#代码注入
更新了:代码注入
描述:基于长链接和代码注入的Android private API暴露框架
URL:https://github.com/yint-tech/sekiro-open
标签:#代码注入
GitHub
GitHub - yint-tech/sekiro-open: SEKIRO is a multi-language, distributed, network topology-independent service publishing platform.…
SEKIRO is a multi-language, distributed, network topology-independent service publishing platform. By writing handlers in their respective languages, functionalities can be published to the central...
GitHub监控消息提醒!!!
更新了:内存马
描述:Java内存马查杀GUI工具,实时动态分析,支持本地和远程查杀
URL:https://github.com/4ra1n/shell-analyzer
标签:#内存马
更新了:内存马
描述:Java内存马查杀GUI工具,实时动态分析,支持本地和远程查杀
URL:https://github.com/4ra1n/shell-analyzer
标签:#内存马
GitHub
GitHub - 4ra1n/shell-analyzer: 通过 JAVA AGENT 查杀内存马,提供简易方便的 GUI 界面,一键反编译目标环境内存马进行分析,支持远程查杀和本地查杀(注意:仅供本地复现分析学习,请勿用于正式和生产环境)
通过 JAVA AGENT 查杀内存马,提供简易方便的 GUI 界面,一键反编译目标环境内存马进行分析,支持远程查杀和本地查杀(注意:仅供本地复现分析学习,请勿用于正式和生产环境) - 4ra1n/shell-analyzer
👍1
GitHub监控消息提醒!!!
更新了:反序列化
描述:简单的本地RPC框架,使用netty实现网络传输,protobuf实现序列化与反序列化
URL:https://github.com/zhaohhhh21/RPC_with_netty_protobuf
标签:#反序列化
更新了:反序列化
描述:简单的本地RPC框架,使用netty实现网络传输,protobuf实现序列化与反序列化
URL:https://github.com/zhaohhhh21/RPC_with_netty_protobuf
标签:#反序列化
👍1
GitHub监控消息提醒!!!
更新了:Red Team
描述:Collection of PoC and offensive techniques used by the BlackArrow Red Team
URL:https://github.com/blackarrowsec/redteam-research
标签:#Red Team
更新了:Red Team
描述:Collection of PoC and offensive techniques used by the BlackArrow Red Team
URL:https://github.com/blackarrowsec/redteam-research
标签:#Red Team
GitHub
GitHub - blackarrowsec/redteam-research: Collection of PoC and offensive techniques used by the BlackArrow Red Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team - blackarrowsec/redteam-research
GitHub监控消息提醒!!!
更新了:Red Team
描述:VagrantFile and supporting resources for building a Red Team kali image
URL:https://github.com/dowrite/rtkali
标签:#Red Team
更新了:Red Team
描述:VagrantFile and supporting resources for building a Red Team kali image
URL:https://github.com/dowrite/rtkali
标签:#Red Team
GitHub
GitHub - dowrite/rtkali: VagrantFile and supporting resources for building a Red Team kali image
VagrantFile and supporting resources for building a Red Team kali image - dowrite/rtkali
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Resources
URL:https://github.com/ATTACKnDEFEND/Red-Team-Resources
标签:#Red Team
更新了:Red Team
描述:Red Team Resources
URL:https://github.com/ATTACKnDEFEND/Red-Team-Resources
标签:#Red Team
GitHub监控消息提醒!!!
更新了:webshell
描述:golang编写的webshell生成工具
URL:https://github.com/YusinoMy/webshell-Gen
标签:#webshell
更新了:webshell
描述:golang编写的webshell生成工具
URL:https://github.com/YusinoMy/webshell-Gen
标签:#webshell
GitHub
GitHub - yusinomy/Webshell-Generate: Web shell generation tool written in go
Web shell generation tool written in go. Contribute to yusinomy/Webshell-Generate development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:Golang写的shellcode免杀加载器思路
URL:https://github.com/YGYoghurt/Go-shellcode-
标签:#免杀
更新了:免杀
描述:Golang写的shellcode免杀加载器思路
URL:https://github.com/YGYoghurt/Go-shellcode-
标签:#免杀
GitHub
GitHub - YGYoghurt/Go-shellcode--: Golang写的shellcode免杀加载器思路
Golang写的shellcode免杀加载器思路. Contribute to YGYoghurt/Go-shellcode-- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
URL:https://github.com/hotpotcookie/cwp-rce-white-box
标签:#Red Team
更新了:Red Team
描述:Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
URL:https://github.com/hotpotcookie/cwp-rce-white-box
标签:#Red Team
GitHub
GitHub - hotpotcookie/CVE-2022-44877-white-box: Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team…
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team 9 - CW2023) - hotpotcookie/CVE-2022-44877-white-box
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team tools written in C#.
URL:https://github.com/cyberphor/redshed
标签:#Red Team
更新了:Red Team
描述:Red Team tools written in C#.
URL:https://github.com/cyberphor/redshed
标签:#Red Team
GitHub
GitHub - cyberphor/redshed: Red Team tools written in C#.
Red Team tools written in C#. Contribute to cyberphor/redshed development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-0669 GoAnywhere MFT command injection vulnerability
URL:https://github.com/cataiovita/CVE-2023-0669
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-0669 GoAnywhere MFT command injection vulnerability
URL:https://github.com/cataiovita/CVE-2023-0669
标签:#CVE-2023
GitHub
GitHub - cataliniovita/CVE-2023-0669: CVE-2023-0669 GoAnywhere MFT command injection vulnerability
CVE-2023-0669 GoAnywhere MFT command injection vulnerability - cataliniovita/CVE-2023-0669