GitHub监控消息提醒!!!
更新了:代码注入
描述:瑞友天翼应用虚拟化-远程代码执行/sql注入,realor-sql-Injection
URL:https://github.com/henryxm/autumn
标签:#代码注入
更新了:代码注入
描述:瑞友天翼应用虚拟化-远程代码执行/sql注入,realor-sql-Injection
URL:https://github.com/henryxm/autumn
标签:#代码注入
GitHub
GitHub - henryxm/autumn: 采用Spring、Spring Boot、Redis、MyBatis、Shiro、Druid框架开发,搭载mysql数据。 如果你厌烦了MyBatis中需要手动创建表的事情,这个项目非常适合你,自动为你生成表。…
采用Spring、Spring Boot、Redis、MyBatis、Shiro、Druid框架开发,搭载mysql数据。 如果你厌烦了MyBatis中需要手动创建表的事情,这个项目非常适合你,自动为你生成表。 从此你不在需要导入sql文件了,项目初始化变得异常简单,结构清晰,易于开发,真正拿来可用。 全注解MyBatis开发,没有任何mapper文件,一切sql 映射都用代码实现,全...
GitHub监控消息提醒!!!
更新了:webshell
描述:这是一个用Go编写的红队内网环境中一个能快速开启HTTP文件浏览服务的小工具,能够执行shell命令,可以执行webshell
URL:https://github.com/tinyibird/HTTPServerGO
标签:#webshell
更新了:webshell
描述:这是一个用Go编写的红队内网环境中一个能快速开启HTTP文件浏览服务的小工具,能够执行shell命令,可以执行webshell
URL:https://github.com/tinyibird/HTTPServerGO
标签:#webshell
GitHub
GitHub - pho3n1x-web/HTTPServerGO: 这是一个用Go编写的红队内网环境中一个能快速开启HTTP文件浏览服务的小工具,能够执行shell命令,可以执行webshell
这是一个用Go编写的红队内网环境中一个能快速开启HTTP文件浏览服务的小工具,能够执行shell命令,可以执行webshell - pho3n1x-web/HTTPServerGO
GitHub监控消息提醒!!!
更新了:Red Team
描述:Exercícios Red Team
URL:https://github.com/FelipeSilvany/POCs
标签:#Red Team
更新了:Red Team
描述:Exercícios Red Team
URL:https://github.com/FelipeSilvany/POCs
标签:#Red Team
GitHub
GitHub - FelipeSilvany/POCs: Exercícios Red Team
Exercícios Red Team. Contribute to FelipeSilvany/POCs development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-21554 unauthenticated RCE in Microsoft Message Queuing (MSMQ)/QueueJumper
URL:https://github.com/C3r7/CVE-2023-21554-RCE
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-21554 unauthenticated RCE in Microsoft Message Queuing (MSMQ)/QueueJumper
URL:https://github.com/C3r7/CVE-2023-21554-RCE
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:webshell
描述:A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS.
URL:https://github.com/cr1f/P.A.S.-Fork
标签:#webshell
更新了:webshell
描述:A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS.
URL:https://github.com/cr1f/P.A.S.-Fork
标签:#webshell
GitHub
GitHub - cr1f/P.A.S.-Fork: A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting…
A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS. - cr1f/P.A.S.-Fork
GitHub监控消息提醒!!!
更新了:红队
描述:红队小工具 | 利用DCERPC协议,无需认证获取Windows机器主机信息和多网卡信息
URL:https://github.com/Y0-kan/HostInfoScan
标签:#红队
更新了:红队
描述:红队小工具 | 利用DCERPC协议,无需认证获取Windows机器主机信息和多网卡信息
URL:https://github.com/Y0-kan/HostInfoScan
标签:#红队
GitHub
GitHub - Y0-kan/HostInfoScan: 红队小工具 | 利用DCERPC协议,无需认证获取Windows机器主机信息和多网卡信息
红队小工具 | 利用DCERPC协议,无需认证获取Windows机器主机信息和多网卡信息. Contribute to Y0-kan/HostInfoScan development by creating an account on GitHub.
❤1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述: CVE-2023-21823 PoC
URL:https://github.com/Elizarfish/CVE-2023-21823
标签:#CVE-2023
更新了:CVE-2023
描述: CVE-2023-21823 PoC
URL:https://github.com/Elizarfish/CVE-2023-21823
标签:#CVE-2023
GitHub
GitHub - Elizarfish/CVE-2023-21823: CVE-2023-21823 PoC
CVE-2023-21823 PoC. Contribute to Elizarfish/CVE-2023-21823 development by creating an account on GitHub.
❤1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-21554 unauthenticated RCE in Microsoft Message Queuing (MSMQ) aka QueueJumper
URL:https://github.com/g1x-r/CVE-2023-21554-PoC
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-21554 unauthenticated RCE in Microsoft Message Queuing (MSMQ) aka QueueJumper
URL:https://github.com/g1x-r/CVE-2023-21554-PoC
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:metasploit module for CVE-2023-21554 remote code execution in msmq service which dont require any authentication and user interaction
URL:https://github.com/g3tS3rvic3s/CVE-2023-21554-RCE-POC
标签:#CVE-2023
更新了:CVE-2023
描述:metasploit module for CVE-2023-21554 remote code execution in msmq service which dont require any authentication and user interaction
URL:https://github.com/g3tS3rvic3s/CVE-2023-21554-RCE-POC
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Lurker is a cross-platform, companion implant to Cobalt Strike built with Go
URL:https://github.com/0x1uke/lurker
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Lurker is a cross-platform, companion implant to Cobalt Strike built with Go
URL:https://github.com/0x1uke/lurker
标签:#Cobalt Strike
GitHub
GitHub - 0x1uke/lurker: Lurker is a cross-platform, companion implant to Cobalt Strike built with Go
Lurker is a cross-platform, companion implant to Cobalt Strike built with Go - 0x1uke/lurker
🔥1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-21839 Python版本
URL:https://github.com/houqe/POC_CVE-2023-21839
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-21839 Python版本
URL:https://github.com/houqe/POC_CVE-2023-21839
标签:#CVE-2023
GitHub
GitHub - houqe/POC_CVE-2023-21839: CVE-2023-21839 Python版本
CVE-2023-21839 Python版本. Contribute to houqe/POC_CVE-2023-21839 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:CVE-2023-1454,Jeecg-Boot 前台SQL注入,CVE-2023-1454批量检测
URL:https://github.com/padbergpete47/CVE-2023-1454
标签:#sql注入
更新了:sql注入
描述:CVE-2023-1454,Jeecg-Boot 前台SQL注入,CVE-2023-1454批量检测
URL:https://github.com/padbergpete47/CVE-2023-1454
标签:#sql注入
GitHub
GitHub - padbergpete47/CVE-2023-1454: CVE-2023-1454,Jeecg-Boot 前台SQL注入,CVE-2023-1454批量检测
CVE-2023-1454,Jeecg-Boot 前台SQL注入,CVE-2023-1454批量检测 - padbergpete47/CVE-2023-1454
GitHub监控消息提醒!!!
更新了:代码审计
描述:渗透利器进阶班!kali/代码审计/网络安全/web安全/测试/信息安全
URL:https://github.com/todo1024/2043
标签:#代码审计
更新了:代码审计
描述:渗透利器进阶班!kali/代码审计/网络安全/web安全/测试/信息安全
URL:https://github.com/todo1024/2043
标签:#代码审计
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试个人积攒的payload集合
URL:https://github.com/zeng-jiahao/Hacking-payloads
标签:#渗透测试
更新了:渗透测试
描述:渗透测试个人积攒的payload集合
URL:https://github.com/zeng-jiahao/Hacking-payloads
标签:#渗透测试
👍2