GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Automatic Explotation PoC for Polkit CVE-2021-3560
URL:https://github.com/aancw/polkit-auto-exploit
更新了:CVE-2021
描述:Automatic Explotation PoC for Polkit CVE-2021-3560
URL:https://github.com/aancw/polkit-auto-exploit
GitHub
GitHub - aancw/polkit-auto-exploit: Automatic Explotation PoC for Polkit CVE-2021-3560
Automatic Explotation PoC for Polkit CVE-2021-3560 - aancw/polkit-auto-exploit
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150)
URL:https://github.com/zwjjustdoit/Xstream-1.4.17
更新了:CVE-2021
描述:XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150)
URL:https://github.com/zwjjustdoit/Xstream-1.4.17
GitHub
GitHub - zwjjustdoit/Xstream-1.4.17: XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150)
XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150) - zwjjustdoit/Xstream-1.4.17
GitHub监控消息提醒!!!
更新了:Red Team
描述:ahronov bohm cybersecurity project arduino toroid coil as countermeasure to Red Team attack on neural hardware or wetware
URL:https://github.com/autonomous019/ahronov-bohm-cybersecurity
更新了:Red Team
描述:ahronov bohm cybersecurity project arduino toroid coil as countermeasure to Red Team attack on neural hardware or wetware
URL:https://github.com/autonomous019/ahronov-bohm-cybersecurity
GitHub
GitHub - autonomous019/ahronov-bohm-cybersecurity: ahronov bohm cybersecurity project arduino toroid coil as countermeasure to…
ahronov bohm cybersecurity project arduino toroid coil as countermeasure to Red Team attack on neural hardware or wetware - autonomous019/ahronov-bohm-cybersecurity
GitHub监控消息提醒!!!
更新了:Red Team
描述:Script powershell pour faire les tests Atomics Red Team
URL:https://github.com/xalacaga/FastAtomic
更新了:Red Team
描述:Script powershell pour faire les tests Atomics Red Team
URL:https://github.com/xalacaga/FastAtomic
GitHub
GitHub - xalacaga/FastAtomic: Script powershell pour faire les tests Atomics Red Team
Script powershell pour faire les tests Atomics Red Team - GitHub - xalacaga/FastAtomic: Script powershell pour faire les tests Atomics Red Team
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
URL:https://github.com/terorie/cve-2021-3449
更新了:CVE-2021
描述:CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
URL:https://github.com/terorie/cve-2021-3449
GitHub
GitHub - riptl/cve-2021-3449: CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻 - riptl/cve-2021-3449
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:An Ansible role for installing Cobalt Strike.
URL:https://github.com/cisagov/ansible-role-cobalt-strike
更新了:Cobalt Strike
描述:An Ansible role for installing Cobalt Strike.
URL:https://github.com/cisagov/ansible-role-cobalt-strike
GitHub
GitHub - cisagov/ansible-role-cobalt-strike: An Ansible role for installing Cobalt Strike.
An Ansible role for installing Cobalt Strike. Contribute to cisagov/ansible-role-cobalt-strike development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Companion website for the course Red Team Adversary Emulation - Mimicking a real-world cyber attack
URL:https://github.com/yaksas443/adversaryemulation.github.io
更新了:Red Team
描述:Companion website for the course Red Team Adversary Emulation - Mimicking a real-world cyber attack
URL:https://github.com/yaksas443/adversaryemulation.github.io
GitHub
GitHub - yaksas443/adversaryemulation.github.io: Companion website for the course Red Team Adversary Emulation - Mimicking a real…
Companion website for the course Red Team Adversary Emulation - Mimicking a real-world cyber attack - GitHub - yaksas443/adversaryemulation.github.io: Companion website for the course Red Team Adve...
GitHub监控消息提醒!!!
更新了:红队
描述:Use Fofa、shodan、zoomeye、360quake to collect information(e.g:domain,IP,CMS,OS)同时调用Fofa、shodan、zoomeye、360quake四个网络空间测绘API完成红队信息收集
URL:https://github.com/Xc1Ym/cyberspace_map_API
更新了:红队
描述:Use Fofa、shodan、zoomeye、360quake to collect information(e.g:domain,IP,CMS,OS)同时调用Fofa、shodan、zoomeye、360quake四个网络空间测绘API完成红队信息收集
URL:https://github.com/Xc1Ym/cyberspace_map_API
GitHub
GitHub - Xc1Ym/cyberspace_map_API: Use Fofa、shodan、zoomeye、360quake to collect information(e.g:domain,IP,CMS,OS)同时调用Fofa、shoda…
Use Fofa、shodan、zoomeye、360quake to collect information(e.g:domain,IP,CMS,OS)同时调用Fofa、shodan、zoomeye、360quake四个网络空间测绘API完成红队信息收集 - Xc1Ym/cyberspace_map_API
GitHub监控消息提醒!!!
更新了:红队
描述:一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
URL:https://github.com/kelvinBen/AppInfoScanner
更新了:红队
描述:一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
URL:https://github.com/kelvinBen/AppInfoScanner
GitHub
GitHub - kelvinBen/AppInfoScanner: 一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端…
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。 - kelvinBen/AppInfoScanner
GitHub监控消息提醒!!!
更新了:Red Team
描述:A Red Team tool for exfiltrating sensitive data from Jira tickets.
URL:https://github.com/antman1p/Jir-Thief
更新了:Red Team
描述:A Red Team tool for exfiltrating sensitive data from Jira tickets.
URL:https://github.com/antman1p/Jir-Thief
GitHub
GitHub - antman1p/Jir-Thief: A Red Team tool for exfiltrating sensitive data from Jira tickets.
A Red Team tool for exfiltrating sensitive data from Jira tickets. - antman1p/Jir-Thief
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike External C2 channel that transfers data over HTTP in the form of files.
URL:https://github.com/fitzgeralddaniel/HTTP_File_Covert_Channel
更新了:Cobalt Strike
描述:Cobalt Strike External C2 channel that transfers data over HTTP in the form of files.
URL:https://github.com/fitzgeralddaniel/HTTP_File_Covert_Channel
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
URL:https://github.com/mgeeky/ElusiveMice
更新了:Cobalt Strike
描述:Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
URL:https://github.com/mgeeky/ElusiveMice
GitHub
GitHub - mgeeky/ElusiveMice: Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind - mgeeky/ElusiveMice