GitHub监控消息提醒!!!
更新了:bypass av
描述:BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
URL:https://github.com/Taowmw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
标签:#bypass av
更新了:bypass av
描述:BypassAV 是一款小型免杀辅助工具,旨在帮助渗透人员应对主流杀软。
URL:https://github.com/Taowmw/Batch-Malware-Builder-FUD-Crypter-AV-UAC-Bypass
标签:#bypass av
GitHub监控消息提醒!!!
更新了:Red Team
描述:Group project with the Build Red Team and HackTheHood
URL:https://github.com/Yajham/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
更新了:Red Team
描述:Group project with the Build Red Team and HackTheHood
URL:https://github.com/Yajham/ShellCode-Encrypt-Tool-Xor-Aes-Fud-Stable
标签:#Red Team
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件
URL:https://github.com/xiaoshao798/web-
标签:#漏洞检测
更新了:漏洞检测
描述:多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件
URL:https://github.com/xiaoshao798/web-
标签:#漏洞检测
GitHub
GitHub - xiaoshao798/web-: 多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件
多线程路径爆破,漏洞检测,生成报告自动打包为ZIP文件. Contribute to xiaoshao798/web- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:burp
描述:burp
URL:https://github.com/SibghaMursaleen/api-hardening-internshipTask
标签:#burp
更新了:burp
描述:burp
URL:https://github.com/SibghaMursaleen/api-hardening-internshipTask
标签:#burp
GitHub
GitHub - SibghaMursaleen/api-hardening-internshipTask: DVWA (Damn Vulnerable Web App) was used in this internship to perform ethical…
DVWA (Damn Vulnerable Web App) was used in this internship to perform ethical hacking and security audits. Tools like Nmap, Nikto, SQLMap, Burp Suite, and Metasploit were used to test for SQLi, CSR...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint vulnerability CVE-2025-53770.
URL:https://github.com/Sec-Dan/CVE-2025-53770-Scanner
标签:#CVE-2025
更新了:CVE-2025
描述:A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint vulnerability CVE-2025-53770.
URL:https://github.com/Sec-Dan/CVE-2025-53770-Scanner
标签:#CVE-2025
GitHub
GitHub - Sec-Dan/CVE-2025-53770-Scanner: A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint…
A Python-based reconnaissance scanner for safely identifying potential exposure to SharePoint vulnerability CVE-2025-53770. - Sec-Dan/CVE-2025-53770-Scanner
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Explore the Microsoft SharePoint CVE-2025-53770 proof of concept. Learn about this vulnerability and its implications. 🐙💻
URL:https://github.com/Lapesha/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:Explore the Microsoft SharePoint CVE-2025-53770 proof of concept. Learn about this vulnerability and its implications. 🐙💻
URL:https://github.com/Lapesha/CVE-2025-53770
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:利用Python写黑客渗透工具(持续更新中,后续难度对本人来说难度较大,所以更新速度放缓),书籍:《python黑帽子:黑客与渗透测试编程之道》,《Python渗透测试编程技术:方法与实践》 因本人水平有限,代码可能会出现bug,如果你发现了bug,欢迎提交修改,谢谢.
URL:https://github.com/TonyD0g/PythonHacker
标签:#渗透测试
更新了:渗透测试
描述:利用Python写黑客渗透工具(持续更新中,后续难度对本人来说难度较大,所以更新速度放缓),书籍:《python黑帽子:黑客与渗透测试编程之道》,《Python渗透测试编程技术:方法与实践》 因本人水平有限,代码可能会出现bug,如果你发现了bug,欢迎提交修改,谢谢.
URL:https://github.com/TonyD0g/PythonHacker
标签:#渗透测试
GitHub
GitHub - TonyD0g/PythonHacker: 利用Python写黑客渗透工具(持续更新中,后续难度对本人来说难度较大,所以更新速度放缓),书籍:《python黑帽子:黑客与渗透测试编程之道》,《Python渗透测试编程技术:方法与实践》…
利用Python写黑客渗透工具(持续更新中,后续难度对本人来说难度较大,所以更新速度放缓),书籍:《python黑帽子:黑客与渗透测试编程之道》,《Python渗透测试编程技术:方法与实践》 因本人水平有限,代码可能会出现bug,如果你发现了bug,欢迎提交修改,谢谢. - TonyD0g/PythonHacker
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-53770 – Vulnerability Research & Exploitation
URL:https://github.com/b33b0y/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-53770 – Vulnerability Research & Exploitation
URL:https://github.com/b33b0y/CVE-2025-53770
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:渗透测试
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/gofinger
标签:#渗透测试
更新了:渗透测试
描述:URLFinder是一款使用 Go 语言编写的高性能网络爬虫和安全侦察工具,专为渗透测试人员、安全研究员和代码审计人员设计。它能深度爬取目标网站,智能发现隐藏的URL、API接口,并能从前端代码(特别是JavaScript文件)中精准地提取各类高价值的敏感信息。
URL:https://github.com/huaimeng666/gofinger
标签:#渗透测试
GitHub
GitHub - huaimeng666/gofinger: GoFinger是一款专为红队攻防和企业资产管理设计的下一代web指纹发现、指纹识别工具。基于 Go 语言开发,它不仅继承了传统指纹工具的识别能力,更在性能、可扩展性和输出质量上进行了深度优化。…
GoFinger是一款专为红队攻防和企业资产管理设计的下一代web指纹发现、指纹识别工具。基于 Go 语言开发,它不仅继承了传统指纹工具的识别能力,更在性能、可扩展性和输出质量上进行了深度优化。 它旨在帮助安全工程师和渗透测试人员快速、精准地识别网络资产指纹,并以美观、易读的格式呈现结果。工具原生支持本地指纹库与 Fofa、Quake、Hunter 等主流API联动,并集成了 Chainr...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔥 PoC for CVE-2025-5777 – Auth Bypass + RCE in Trend Micro Apex Central
URL:https://github.com/Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:🔥 PoC for CVE-2025-5777 – Auth Bypass + RCE in Trend Micro Apex Central
URL:https://github.com/Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE
标签:#CVE-2025
GitHub
GitHub - Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE: PoC for CVE-2025-5777 – Auth Bypass and RCE in Trend Micro Apex Central
PoC for CVE-2025-5777 – Auth Bypass and RCE in Trend Micro Apex Central - Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX
URL:https://github.com/demining/Digital-Signature-Forgery-Attack
标签:#CVE-2025
更新了:CVE-2025
描述:How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX
URL:https://github.com/demining/Digital-Signature-Forgery-Attack
标签:#CVE-2025
GitHub
GitHub - demining/Digital-Signature-Forgery-Attack: How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi…
How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX - demining/Digital-Signature-Forgery-Attack
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:PCAP Threat Hunting with Wireshark -TrickBot & Cobalt Strike Detection | DNS & HTTP
URL:https://github.com/YASHWANTgs/pcap-threat-hunting-trickbot
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:PCAP Threat Hunting with Wireshark -TrickBot & Cobalt Strike Detection | DNS & HTTP
URL:https://github.com/YASHWANTgs/pcap-threat-hunting-trickbot
标签:#Cobalt Strike
GitHub
GitHub - YASHWANTgs/pcap-threat-hunting-trickbot: PCAP Threat Hunting with Wireshark -TrickBot & Cobalt Strike Detection | DNS…
PCAP Threat Hunting with Wireshark -TrickBot & Cobalt Strike Detection | DNS & HTTP - YASHWANTgs/pcap-threat-hunting-trickbot
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-50777: Root Access and Plaintext Credential Exposure in AZIOT Smart CCTV
URL:https://github.com/veereshgadige/aziot-cctv-cve-2025-50777
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-50777: Root Access and Plaintext Credential Exposure in AZIOT Smart CCTV
URL:https://github.com/veereshgadige/aziot-cctv-cve-2025-50777
标签:#CVE-2025
GitHub
GitHub - veereshgadige/aziot-cctv-cve-2025-50777: CVE-2025-50777: Root Access and Plaintext Credential Exposure in AZIOT Smart…
CVE-2025-50777: Root Access and Plaintext Credential Exposure in AZIOT Smart CCTV - veereshgadige/aziot-cctv-cve-2025-50777
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Mezzanine CMS 6.1.0 XSS (CVE-2025-50481)
URL:https://github.com/kevinpdicks/Mezzanine-CMS-6.1.0-XSS
标签:#CVE-2025
更新了:CVE-2025
描述:Mezzanine CMS 6.1.0 XSS (CVE-2025-50481)
URL:https://github.com/kevinpdicks/Mezzanine-CMS-6.1.0-XSS
标签:#CVE-2025
GitHub
GitHub - kevinpdicks/Mezzanine-CMS-6.1.0-XSS: Mezzanine CMS 6.1.0 XSS (CVE-2025-50481)
Mezzanine CMS 6.1.0 XSS (CVE-2025-50481). Contribute to kevinpdicks/Mezzanine-CMS-6.1.0-XSS development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX
URL:https://github.com/Kamal-Hegazi/CVE-2025-53770-SharePoint-RCE
标签:#CVE-2025
更新了:CVE-2025
描述:How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX
URL:https://github.com/Kamal-Hegazi/CVE-2025-53770-SharePoint-RCE
标签:#CVE-2025
GitHub
GitHub - 0xh3g4z1/CVE-2025-53770-SharePoint-RCE: Exploit & research for CVE‑2025‑53770 – a zero‑day remote code execution vulnerability…
Exploit & research for CVE‑2025‑53770 – a zero‑day remote code execution vulnerability in Microsoft SharePoint (on‑premises). - 0xh3g4z1/CVE-2025-53770-SharePoint-RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC exploit for CVE-2025-7766 – XXE vulnerability leading to potential RCE.
URL:https://github.com/byteReaper77/CVE-2025-7766
标签:#CVE-2025
更新了:CVE-2025
描述:PoC exploit for CVE-2025-7766 – XXE vulnerability leading to potential RCE.
URL:https://github.com/byteReaper77/CVE-2025-7766
标签:#CVE-2025
GitHub
GitHub - byteReaper77/CVE-2025-7766: PoC exploit for CVE-2025-7766 – XXE vulnerability leading to potential RCE.
PoC exploit for CVE-2025-7766 – XXE vulnerability leading to potential RCE. - byteReaper77/CVE-2025-7766
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Mezzanine CMS 6.1.0 XSS (CVE-2025-50481)
URL:https://github.com/exfil0/CVE-2025-53770
标签:#CVE-2025
更新了:CVE-2025
描述:Mezzanine CMS 6.1.0 XSS (CVE-2025-50481)
URL:https://github.com/exfil0/CVE-2025-53770
标签:#CVE-2025
GitHub
GitHub - exfil0/CVE-2025-53770: A sophisticated, wizard-driven Python exploit tool targeting CVE-2025-53770, a critical (CVSS 9.8)…
A sophisticated, wizard-driven Python exploit tool targeting CVE-2025-53770, a critical (CVSS 9.8) unauthenticated remote code execution (RCE) vulnerability in on-premises Microsoft SharePoint Serv...