GitHub监控消息提醒!!!
更新了:代码审计
描述:一个简单的基于静态分析技术的PHP代码审计工具原型
URL:https://github.com/vials-1979/PHP-Static-Analysis
标签:#代码审计
更新了:代码审计
描述:一个简单的基于静态分析技术的PHP代码审计工具原型
URL:https://github.com/vials-1979/PHP-Static-Analysis
标签:#代码审计
GitHub
GitHub - vials-1979/PHP-Static-Analysis: 一个简单的基于静态分析技术的PHP代码审计工具原型
一个简单的基于静态分析技术的PHP代码审计工具原型. Contribute to vials-1979/PHP-Static-Analysis development by creating an account on GitHub.
❤1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC
标签:#CVE-2023
更新了:CVE-2023
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC
标签:#CVE-2023
GitHub
GitHub - DRAGOWN/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC: In Paradox Security System IPR512…
In Paradox Security System IPR512 Web console login form page, attacker can input JavaScript string, such as "</script>" that will overwrite configurations in the fi...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team engagements scripts
URL:https://github.com/0xForp/Red-Teaming
标签:#Red Team
更新了:Red Team
描述:Red Team engagements scripts
URL:https://github.com/0xForp/Red-Teaming
标签:#Red Team
GitHub
GitHub - 0xForp/Red-Teaming: Red Teaming Tools/Scripts
Red Teaming Tools/Scripts. Contribute to 0xForp/Red-Teaming development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Test environments for CVE-2023-28432, information disclosure in MinIO clusters
URL:https://github.com/h0ng10/CVE-2023-28432_docker
标签:#CVE-2023
更新了:CVE-2023
描述:Test environments for CVE-2023-28432, information disclosure in MinIO clusters
URL:https://github.com/h0ng10/CVE-2023-28432_docker
标签:#CVE-2023
GitHub
GitHub - h0ng10/CVE-2023-28432_docker: Test environments for CVE-2023-28432, information disclosure in MinIO clusters
Test environments for CVE-2023-28432, information disclosure in MinIO clusters - h0ng10/CVE-2023-28432_docker
GitHub监控消息提醒!!!
更新了:免杀
描述:一些自己无聊写的免杀php木马,经过测试webshell杀软扫描等,不报毒
URL:https://github.com/Pings1031/PHPwebshell
标签:#免杀
更新了:免杀
描述:一些自己无聊写的免杀php木马,经过测试webshell杀软扫描等,不报毒
URL:https://github.com/Pings1031/PHPwebshell
标签:#免杀
GitHub
GitHub - BugFor-Pings/PHPwebshell: 一些自己无聊写的免杀php木马,404页面伪装大马-Apache+Nginx版本,phpinfo伪装马,404页面代码执行一句话,phpinfo代码执行一句话
一些自己无聊写的免杀php木马,404页面伪装大马-Apache+Nginx版本,phpinfo伪装马,404页面代码执行一句话,phpinfo代码执行一句话 - GitHub - BugFor-Pings/PHPwebshell: 一些自己无聊写的免杀php木马,404页面伪装大马-Apache+Nginx版本,phpinfo伪装马,404页面代码执行一句话,phpinfo代码执行一句话
❤1
GitHub监控消息提醒!!!
更新了:bypassav
描述:在线shellcode免杀
URL:https://github.com/bytecaps/online_bypassav
标签:#bypassav
更新了:bypassav
描述:在线shellcode免杀
URL:https://github.com/bytecaps/online_bypassav
标签:#bypassav
GitHub
GitHub - doocop/online_bypassav: 在线shellcode免杀
在线shellcode免杀. Contribute to doocop/online_bypassav development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypassav
描述:在线shellcode免杀
URL:https://github.com/ByteCaps/online_bypassav
标签:#bypassav
更新了:bypassav
描述:在线shellcode免杀
URL:https://github.com/ByteCaps/online_bypassav
标签:#bypassav
GitHub
GitHub - doocop/online_bypassav: 在线shellcode免杀
在线shellcode免杀. Contribute to doocop/online_bypassav development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:对vAudit-demo靶场进行代码审计和修复
URL:https://github.com/KanbaraAkihito/vAudit-demo-repair
标签:#代码审计
更新了:代码审计
描述:对vAudit-demo靶场进行代码审计和修复
URL:https://github.com/KanbaraAkihito/vAudit-demo-repair
标签:#代码审计
GitHub
GitHub - KanbaraAkihito/vAudit-demo-repair: 对vAudit-demo靶场进行代码审计和修复
对vAudit-demo靶场进行代码审计和修复. Contribute to KanbaraAkihito/vAudit-demo-repair development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-30459
URL:https://github.com/Toxich4/CVE-2023-30459
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-30459
URL:https://github.com/Toxich4/CVE-2023-30459
标签:#CVE-2023
GitHub
GitHub - Toxich4/CVE-2023-30459: CVE-2023-30459
CVE-2023-30459. Contribute to Toxich4/CVE-2023-30459 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:ChatGPT加持的多人协同渗透测试报告编写/导出平台
URL:https://github.com/sec-report/SecReport
标签:#渗透测试
更新了:渗透测试
描述:ChatGPT加持的多人协同渗透测试报告编写/导出平台
URL:https://github.com/sec-report/SecReport
标签:#渗透测试
GitHub
GitHub - sec-report/SecReport: ChatGPT加持的,多人在线协同信息安全报告编写平台。目前支持的报告类型:渗透测试报告,APP隐私合规报告。
ChatGPT加持的,多人在线协同信息安全报告编写平台。目前支持的报告类型:渗透测试报告,APP隐私合规报告。 - sec-report/SecReport
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/Albocoder/cve-2022-27666-exploits
标签:#CVE-2023
更新了:CVE-2023
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/Albocoder/cve-2022-27666-exploits
标签:#CVE-2023
GitHub
GitHub - Albocoder/cve-2022-27666-exploits: There are 2 exploitation methods that exploit CVE-2022-27666. For more info on how…
There are 2 exploitation methods that exploit CVE-2022-27666. For more info on how to use these code bases please check my blog. - Albocoder/cve-2022-27666-exploits
👍1
Forwarded from 🌈「频道」一流羊毛线报
先领2张券 https://u.jd.com/bunDIlZ https://u.jd.com/bzn1rUf 【预售】壹棵弘芯 山东大樱桃 优选5斤 https://u.jd.com/bQnOeuZ 69包邮,低至13.8元/斤 *预售好价,实现大樱桃自由~
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:基于Cobalt Strike 4.5二开版
URL:https://github.com/CKevens/Cobalt-Strike-4.5-Secondary-modification
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:基于Cobalt Strike 4.5二开版
URL:https://github.com/CKevens/Cobalt-Strike-4.5-Secondary-modification
标签:#Cobalt Strike
GitHub
GitHub - CKevens/Cobalt-Strike-4.5-Secondary-modification: 基于Cobalt Strike 4.5二开版
基于Cobalt Strike 4.5二开版. Contribute to CKevens/Cobalt-Strike-4.5-Secondary-modification development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-27703 An Android version of pikpak version V1.29.2 element debugging interface leakage vulnerability
URL:https://github.com/happy0717/CVE-2023-27703
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-27703 An Android version of pikpak version V1.29.2 element debugging interface leakage vulnerability
URL:https://github.com/happy0717/CVE-2023-27703
标签:#CVE-2023
GitHub
GitHub - happy0717/CVE-2023-27703: CVE-2023-27703 An Android version of pikpak version V1.29.2 element debugging interface leakage…
CVE-2023-27703 An Android version of pikpak version V1.29.2 element debugging interface leakage vulnerability - happy0717/CVE-2023-27703
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-27704 Void Tools Everything lower than v1.4.1.1022 was discovered to contain a Regular Expression Denial of Service (ReDoS)
URL:https://github.com/happy0717/CVE-2023-27704
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-27704 Void Tools Everything lower than v1.4.1.1022 was discovered to contain a Regular Expression Denial of Service (ReDoS)
URL:https://github.com/happy0717/CVE-2023-27704
标签:#CVE-2023
GitHub
GitHub - happy0717/CVE-2023-27704: CVE-2023-27704 Void Tools Everything lower than v1.4.1.1022 was discovered to contain a Regular…
CVE-2023-27704 Void Tools Everything lower than v1.4.1.1022 was discovered to contain a Regular Expression Denial of Service (ReDoS) - GitHub - happy0717/CVE-2023-27704: CVE-2023-27704 Void Tools E...