GitHub监控消息提醒!!!
更新了:Red Team
描述:HTU Cyber Security Club, Offensive Operations Section ( Red Team ) learning pathway
URL:https://github.com/kawaiipantsu/exfiltration-thugsred-service
标签:#Red Team
更新了:Red Team
描述:HTU Cyber Security Club, Offensive Operations Section ( Red Team ) learning pathway
URL:https://github.com/kawaiipantsu/exfiltration-thugsred-service
标签:#Red Team
GitHub
GitHub - kawaiipantsu/exfiltration-thugsred-service: An red-team exfiltration service for showcasing or in field usage, this is…
An red-team exfiltration service for showcasing or in field usage, this is also what thugs.red is running online for public usage for quick showcase implementation etc. The content provided is for ...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized
URL:https://github.com/karthikuj/CVE-2023-23752-Docker
标签:#CVE-2023
更新了:CVE-2023
描述:Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized
URL:https://github.com/karthikuj/CVE-2023-23752-Docker
标签:#CVE-2023
GitHub
GitHub - karthikuj/CVE-2023-23752-Docker: Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized
Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized - karthikuj/CVE-2023-23752-Docker
GitHub监控消息提醒!!!
更新了:getshell
描述:本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更新例如:log4jRCE,向日葵 禅道RCE 等等.
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
标签:#getshell
更新了:getshell
描述:本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更新例如:log4jRCE,向日葵 禅道RCE 等等.
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
标签:#getshell
GitHub
GitHub - peiqiF4ck/WebFrameworkTools-5.5-enhance: 本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getsh…
本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更新例如:log4jRCE,向日葵 禅道RCE 瑞友天翼应用虚拟化系统sql注入导致RCE大华智慧园区上传,金蝶云星空漏洞等等. ...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:用于渗透测试中对40x页面进行bypass并发扫描,采用go编写
URL:https://github.com/carl1l/f403
标签:#渗透测试
更新了:渗透测试
描述:用于渗透测试中对40x页面进行bypass并发扫描,采用go编写
URL:https://github.com/carl1l/f403
标签:#渗透测试
GitHub
GitHub - carl1l/f403: 用于渗透测试中对40x页面进行bypass并发扫描,采用go编写
用于渗透测试中对40x页面进行bypass并发扫描,采用go编写. Contribute to carl1l/f403 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Discord bot for mitigating the aCropalypse vulnerability (CVE-2023-21036) by retroactively deleting vulnerable images
URL:https://github.com/qixils/AntiCropalypse
标签:#CVE-2023
更新了:CVE-2023
描述:Discord bot for mitigating the aCropalypse vulnerability (CVE-2023-21036) by retroactively deleting vulnerable images
URL:https://github.com/qixils/AntiCropalypse
标签:#CVE-2023
GitHub
GitHub - qixils/AntiCropalypse: Discord bot for mitigating the aCropalypse vulnerability (CVE-2023-21036, CVE-2023-28303) by retroactively…
Discord bot for mitigating the aCropalypse vulnerability (CVE-2023-21036, CVE-2023-28303) by retroactively deleting vulnerable images - GitHub - qixils/AntiCropalypse: Discord bot for mitigating th...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-21036 detection in Go
URL:https://github.com/notaSWE/gocropalypse
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-21036 detection in Go
URL:https://github.com/notaSWE/gocropalypse
标签:#CVE-2023
GitHub
GitHub - notaSWE/gocropalypse: CVE-2023-21036 detection in Go
CVE-2023-21036 detection in Go. Contribute to notaSWE/gocropalypse development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Tools and Resources for Physical Security Red Teaming
URL:https://github.com/Reconnaishawnce/Red-Team
标签:#Red Team
更新了:Red Team
描述:Tools and Resources for Physical Security Red Teaming
URL:https://github.com/Reconnaishawnce/Red-Team
标签:#Red Team
GitHub
GitHub - Reconnaishawnce/Red-Team: Tools and Resources for Physical Security Red Teaming
Tools and Resources for Physical Security Red Teaming - Reconnaishawnce/Red-Team
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:bot to find and delete images affected by CVE-2023-21036
URL:https://github.com/schdork/acropolypse-bot
标签:#CVE-2023
更新了:CVE-2023
描述:bot to find and delete images affected by CVE-2023-21036
URL:https://github.com/schdork/acropolypse-bot
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:Red Team
描述:Some Red Team cheatsheets from courses i took
URL:https://github.com/Untruesec/Red-team-cheatsheets
标签:#Red Team
更新了:Red Team
描述:Some Red Team cheatsheets from courses i took
URL:https://github.com/Untruesec/Red-team-cheatsheets
标签:#Red Team
GitHub
GitHub - Untruesec/Red-team-cheatsheets: Some Red Team cheatsheets from courses i took
Some Red Team cheatsheets from courses i took. Contribute to Untruesec/Red-team-cheatsheets development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:This PoC demonstrates the vulnerability described in CVE-2023-28858
URL:https://github.com/improbably-you/poc_cve_2023_28858
标签:#CVE-2023
更新了:CVE-2023
描述:This PoC demonstrates the vulnerability described in CVE-2023-28858
URL:https://github.com/improbably-you/poc_cve_2023_28858
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:钓鱼
描述:通过一系列开源情报技术,钓鱼,试图在匿名平台上找到确切的人的ip地址等信息,这是个非常隐蔽钓鱼工具,我还在构思更多模块,这会是我接下来几个月的学习重心
URL:https://github.com/LDZ-27/anonymous-ip-spy
标签:#钓鱼
更新了:钓鱼
描述:通过一系列开源情报技术,钓鱼,试图在匿名平台上找到确切的人的ip地址等信息,这是个非常隐蔽钓鱼工具,我还在构思更多模块,这会是我接下来几个月的学习重心
URL:https://github.com/LDZ-27/anonymous-ip-spy
标签:#钓鱼
GitHub
LDZ-27/anonymous-ip-spy
通过一系列开源情报技术,钓鱼,试图在匿名平台上找到确切的人的ip地址等信息,这是个非常隐蔽钓鱼工具,我还在构思更多模块,这会是我接下来几个月的学习重心 - LDZ-27/anonymous-ip-spy
GitHub监控消息提醒!!!
更新了:绕过
描述:Nacos(QVD-2023-6271)身份认证绕过poc,支持批量检测和添加用户
URL:https://github.com/MzzdToT/Nacos_default.token
标签:#绕过
更新了:绕过
描述:Nacos(QVD-2023-6271)身份认证绕过poc,支持批量检测和添加用户
URL:https://github.com/MzzdToT/Nacos_default.token
标签:#绕过
GitHub
GitHub - MzzdToT/Nacos_scan: Nacos漏洞扫描(未授权、sql注入. . .),支持批量检测和添加用户
Nacos漏洞扫描(未授权、sql注入. . .),支持批量检测和添加用户. Contribute to MzzdToT/Nacos_scan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:EXP for CVE-2023-28434 MinIO unauthorized to RCE
URL:https://github.com/AbelChe/evil_minio
标签:#CVE-2023
更新了:CVE-2023
描述:EXP for CVE-2023-28434 MinIO unauthorized to RCE
URL:https://github.com/AbelChe/evil_minio
标签:#CVE-2023
GitHub
GitHub - AbelChe/evil_minio: EXP for CVE-2023-28434 MinIO unauthorized to RCE
EXP for CVE-2023-28434 MinIO unauthorized to RCE. Contribute to AbelChe/evil_minio development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Repository of scripts for UFSIT Red Team
URL:https://github.com/ColbyJack1134/UFSIT-RED
标签:#Red Team
更新了:Red Team
描述:Repository of scripts for UFSIT Red Team
URL:https://github.com/ColbyJack1134/UFSIT-RED
标签:#Red Team
GitHub
GitHub - ColbyJack1134/UFSIT-RED: Repository of scripts for UFSIT Red Team
Repository of scripts for UFSIT Red Team. Contribute to ColbyJack1134/UFSIT-RED development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Prueba de Red Team a Canalsur
URL:https://github.com/AlbertoDobladoV/Red-Team
标签:#Red Team
更新了:Red Team
描述:Prueba de Red Team a Canalsur
URL:https://github.com/AlbertoDobladoV/Red-Team
标签:#Red Team
GitHub
GitHub - AlbertoDobladoV/Red-Team: Prueba de Red Team a Canalsur
Prueba de Red Team a Canalsur. Contribute to AlbertoDobladoV/Red-Team development by creating an account on GitHub.