GitHub监控消息提醒!!!
更新了:Red Team
描述:S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
URL:https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
标签:#Red Team
更新了:Red Team
描述:S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
URL:https://github.com/blackhatethicalhacking/S3cr3tDetect0rz
标签:#Red Team
GitHub
GitHub - blackhatethicalhacking/SecretOpt1c: SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites…
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy! - blackhatethicalhacking/SecretOpt1c
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
URL:https://github.com/Malwareman007/CVE-2023-21608
标签:#CVE-2023
更新了:CVE-2023
描述:Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
URL:https://github.com/Malwareman007/CVE-2023-21608
标签:#CVE-2023
GitHub
GitHub - Malwareman007/CVE-2023-21608: Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit - Malwareman007/CVE-2023-21608
GitHub监控消息提醒!!!
更新了:钓鱼
描述:对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^▽^*)Setoolkit_CN汉化
URL:https://github.com/light-Life/Setoolkit_CN
标签:#钓鱼
更新了:钓鱼
描述:对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^▽^*)Setoolkit_CN汉化
URL:https://github.com/light-Life/Setoolkit_CN
标签:#钓鱼
GitHub
GitHub - light-Life/Setoolkit_CN: 对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^▽^*)Setoolkit_CN汉化
对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^ ▽^*)Setoolkit_CN汉化 - GitHub - light-Life/Setoolkit_CN: 对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^ ▽^*)Setool...
GitHub监控消息提醒!!!
更新了:代码注入
描述:基于长链接和代码注入的Android private API暴露框架
URL:https://github.com/yint-tech/sekiro-open
标签:#代码注入
更新了:代码注入
描述:基于长链接和代码注入的Android private API暴露框架
URL:https://github.com/yint-tech/sekiro-open
标签:#代码注入
GitHub
GitHub - yint-tech/sekiro-open: SEKIRO is a multi-language, distributed, network topology-independent service publishing platform.…
SEKIRO is a multi-language, distributed, network topology-independent service publishing platform. By writing handlers in their respective languages, functionalities can be published to the central...
GitHub监控消息提醒!!!
更新了:内存马
描述:Java内存马查杀GUI工具,实时动态分析,支持本地和远程查杀
URL:https://github.com/4ra1n/shell-analyzer
标签:#内存马
更新了:内存马
描述:Java内存马查杀GUI工具,实时动态分析,支持本地和远程查杀
URL:https://github.com/4ra1n/shell-analyzer
标签:#内存马
GitHub
GitHub - 4ra1n/shell-analyzer: 通过 JAVA AGENT 查杀内存马,提供简易方便的 GUI 界面,一键反编译目标环境内存马进行分析,支持远程查杀和本地查杀(注意:仅供本地复现分析学习,请勿用于正式和生产环境)
通过 JAVA AGENT 查杀内存马,提供简易方便的 GUI 界面,一键反编译目标环境内存马进行分析,支持远程查杀和本地查杀(注意:仅供本地复现分析学习,请勿用于正式和生产环境) - 4ra1n/shell-analyzer
👍1
GitHub监控消息提醒!!!
更新了:反序列化
描述:简单的本地RPC框架,使用netty实现网络传输,protobuf实现序列化与反序列化
URL:https://github.com/zhaohhhh21/RPC_with_netty_protobuf
标签:#反序列化
更新了:反序列化
描述:简单的本地RPC框架,使用netty实现网络传输,protobuf实现序列化与反序列化
URL:https://github.com/zhaohhhh21/RPC_with_netty_protobuf
标签:#反序列化
👍1
GitHub监控消息提醒!!!
更新了:Red Team
描述:Collection of PoC and offensive techniques used by the BlackArrow Red Team
URL:https://github.com/blackarrowsec/redteam-research
标签:#Red Team
更新了:Red Team
描述:Collection of PoC and offensive techniques used by the BlackArrow Red Team
URL:https://github.com/blackarrowsec/redteam-research
标签:#Red Team
GitHub
GitHub - blackarrowsec/redteam-research: Collection of PoC and offensive techniques used by the BlackArrow Red Team
Collection of PoC and offensive techniques used by the BlackArrow Red Team - blackarrowsec/redteam-research
GitHub监控消息提醒!!!
更新了:Red Team
描述:VagrantFile and supporting resources for building a Red Team kali image
URL:https://github.com/dowrite/rtkali
标签:#Red Team
更新了:Red Team
描述:VagrantFile and supporting resources for building a Red Team kali image
URL:https://github.com/dowrite/rtkali
标签:#Red Team
GitHub
GitHub - dowrite/rtkali: VagrantFile and supporting resources for building a Red Team kali image
VagrantFile and supporting resources for building a Red Team kali image - dowrite/rtkali
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Resources
URL:https://github.com/ATTACKnDEFEND/Red-Team-Resources
标签:#Red Team
更新了:Red Team
描述:Red Team Resources
URL:https://github.com/ATTACKnDEFEND/Red-Team-Resources
标签:#Red Team
GitHub监控消息提醒!!!
更新了:webshell
描述:golang编写的webshell生成工具
URL:https://github.com/YusinoMy/webshell-Gen
标签:#webshell
更新了:webshell
描述:golang编写的webshell生成工具
URL:https://github.com/YusinoMy/webshell-Gen
标签:#webshell
GitHub
GitHub - yusinomy/Webshell-Generate: Web shell generation tool written in go
Web shell generation tool written in go. Contribute to yusinomy/Webshell-Generate development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:Golang写的shellcode免杀加载器思路
URL:https://github.com/YGYoghurt/Go-shellcode-
标签:#免杀
更新了:免杀
描述:Golang写的shellcode免杀加载器思路
URL:https://github.com/YGYoghurt/Go-shellcode-
标签:#免杀
GitHub
GitHub - YGYoghurt/Go-shellcode--: Golang写的shellcode免杀加载器思路
Golang写的shellcode免杀加载器思路. Contribute to YGYoghurt/Go-shellcode-- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
URL:https://github.com/hotpotcookie/cwp-rce-white-box
标签:#Red Team
更新了:Red Team
描述:Red Team utilities for setting up CWP CentOS 7 payload & reverse shell, as it refers to CVE-2022-44877
URL:https://github.com/hotpotcookie/cwp-rce-white-box
标签:#Red Team
GitHub
GitHub - hotpotcookie/CVE-2022-44877-white-box: Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team…
Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team 9 - CW2023) - hotpotcookie/CVE-2022-44877-white-box
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team tools written in C#.
URL:https://github.com/cyberphor/redshed
标签:#Red Team
更新了:Red Team
描述:Red Team tools written in C#.
URL:https://github.com/cyberphor/redshed
标签:#Red Team
GitHub
GitHub - cyberphor/redshed: Red Team tools written in C#.
Red Team tools written in C#. Contribute to cyberphor/redshed development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-0669 GoAnywhere MFT command injection vulnerability
URL:https://github.com/cataiovita/CVE-2023-0669
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-0669 GoAnywhere MFT command injection vulnerability
URL:https://github.com/cataiovita/CVE-2023-0669
标签:#CVE-2023
GitHub
GitHub - cataliniovita/CVE-2023-0669: CVE-2023-0669 GoAnywhere MFT command injection vulnerability
CVE-2023-0669 GoAnywhere MFT command injection vulnerability - cataliniovita/CVE-2023-0669
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-0669 GoAnywhere MFT command injection vulnerability
URL:https://github.com/Live-Hack-CVE/CVE-2023-22855
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-0669 GoAnywhere MFT command injection vulnerability
URL:https://github.com/Live-Hack-CVE/CVE-2023-22855
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:Red Team
描述:S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
URL:https://github.com/ice-wzl/wmiexec2.0
标签:#Red Team
更新了:Red Team
描述:S3cr3tDetect0rz is a Red Team tool that helps uncover sensitive information in websites using ACTIVE not PASSIVE Techniques for Superior Accuracy!
URL:https://github.com/ice-wzl/wmiexec2.0
标签:#Red Team
GitHub
GitHub - ice-wzl/wmiexec2: wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated…
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additiona...