GitHub监控消息提醒!!!
更新了:反序列化
描述:fastjson反序列化检测工具,批量扫描fastjson漏洞
URL:https://github.com/hkxueqi/Fastjson-poc-scan
标签:#反序列化
更新了:反序列化
描述:fastjson反序列化检测工具,批量扫描fastjson漏洞
URL:https://github.com/hkxueqi/Fastjson-poc-scan
标签:#反序列化
GitHub
GitHub - hkxueqi/Fastjson-poc-scan: fastjson反序列化检测工具,批量扫描fastjson漏洞
fastjson反序列化检测工具,批量扫描fastjson漏洞. Contribute to hkxueqi/Fastjson-poc-scan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Active Directory Penetration Testing for Red Teams
URL:https://github.com/rfs85/Active-Directory-Penetration-Testing
标签:#Red Team
更新了:Red Team
描述:Active Directory Penetration Testing for Red Teams
URL:https://github.com/rfs85/Active-Directory-Penetration-Testing
标签:#Red Team
GitHub
GitHub - AD-Attacks/Active-Directory-Penetration-Testing: Active Directory Penetration Testing for Red Teams
Active Directory Penetration Testing for Red Teams - GitHub - AD-Attacks/Active-Directory-Penetration-Testing: Active Directory Penetration Testing for Red Teams
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Thruk Monitoring Web Interface <= 3.06 vulnerable to CVE-2023-34096 (Path Traversal).
URL:https://github.com/galoget/Thruk-CVE-2023-34096
标签:#CVE-2023
更新了:CVE-2023
描述:Thruk Monitoring Web Interface <= 3.06 vulnerable to CVE-2023-34096 (Path Traversal).
URL:https://github.com/galoget/Thruk-CVE-2023-34096
标签:#CVE-2023
GitHub
GitHub - galoget/Thruk-CVE-2023-34096: Thruk Monitoring Web Interface <= 3.06 vulnerable to CVE-2023-34096 (Path Traversal).
Thruk Monitoring Web Interface <= 3.06 vulnerable to CVE-2023-34096 (Path Traversal). - GitHub - galoget/Thruk-CVE-2023-34096: Thruk Monitoring Web Interface <= 3.06 vulnerable to CVE...
GitHub监控消息提醒!!!
更新了:应急响应
描述:本人收集和学习的 pdf 电子书包含有:web 安全、渗透测试、红蓝对抗、应急响应等等技术集
URL:https://github.com/Tripse/awesome-security-book-pdf
标签:#应急响应
更新了:应急响应
描述:本人收集和学习的 pdf 电子书包含有:web 安全、渗透测试、红蓝对抗、应急响应等等技术集
URL:https://github.com/Tripse/awesome-security-book-pdf
标签:#应急响应
GitHub
GitHub - Tripse/awesome-security-book-pdf: 过往收集和学习的 pdf 电子书包含有:web 安全、渗透测试、红蓝对抗、应急响应等等技术集
过往收集和学习的 pdf 电子书包含有:web 安全、渗透测试、红蓝对抗、应急响应等等技术集. Contribute to Tripse/awesome-security-book-pdf development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-34960 Chamilo PoC
URL:https://github.com/Aituglo/CVE-2023-34960
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-34960 Chamilo PoC
URL:https://github.com/Aituglo/CVE-2023-34960
标签:#CVE-2023
GitHub
GitHub - Aituglo/CVE-2023-34960: CVE-2023-34960 Chamilo PoC
CVE-2023-34960 Chamilo PoC. Contribute to Aituglo/CVE-2023-34960 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-0630 - Slimstat Analytics < 4.9.3.3 - Subscriber+ SQL Injection
URL:https://github.com/RandomRobbieBF/CVE-2023-0630
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-0630 - Slimstat Analytics < 4.9.3.3 - Subscriber+ SQL Injection
URL:https://github.com/RandomRobbieBF/CVE-2023-0630
标签:#CVE-2023
GitHub
GitHub - RandomRobbieBF/CVE-2023-0630: CVE-2023-0630 - Slimstat Analytics < 4.9.3.3 - Subscriber+ SQL Injection
CVE-2023-0630 - Slimstat Analytics < 4.9.3.3 - Subscriber+ SQL Injection - RandomRobbieBF/CVE-2023-0630
👍1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Proof of Concept for vulnerability CVE-2023-2986 in 'Abandoned Cart Lite for WooCommerce' Plugin in WordPress
URL:https://github.com/Ayantaker/CVE-2023-2986
标签:#CVE-2023
更新了:CVE-2023
描述:Proof of Concept for vulnerability CVE-2023-2986 in 'Abandoned Cart Lite for WooCommerce' Plugin in WordPress
URL:https://github.com/Ayantaker/CVE-2023-2986
标签:#CVE-2023
GitHub
GitHub - Ayantaker/CVE-2023-2986: Proof of Concept for vulnerability CVE-2023-2986 in 'Abandoned Cart Lite for WooCommerce' Plugin…
Proof of Concept for vulnerability CVE-2023-2986 in 'Abandoned Cart Lite for WooCommerce' Plugin in WordPress - Ayantaker/CVE-2023-2986
GitHub监控消息提醒!!!
更新了:Red Team
描述:Bot to use Discord as a C2 for Red Team
URL:https://github.com/bucksnort2/DiscordC2
标签:#Red Team
更新了:Red Team
描述:Bot to use Discord as a C2 for Red Team
URL:https://github.com/bucksnort2/DiscordC2
标签:#Red Team
GitHub
GitHub - bucksnort2/PyC2ord: Bot to use Discord as a C2 for Red Team
Bot to use Discord as a C2 for Red Team. Contribute to bucksnort2/PyC2ord development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Bot to use Discord as a C2 for Red Team
URL:https://github.com/AhamedAlif/About_Alva
标签:#Red Team
更新了:Red Team
描述:Bot to use Discord as a C2 for Red Team
URL:https://github.com/AhamedAlif/About_Alva
标签:#Red Team
GitHub
GitHub - AhamedAlif/About_Alva: Ahamed Alif Alva: Cybersecurity researcher & ethical hacker. Expertise in OSINT, red/blue team…
Ahamed Alif Alva: Cybersecurity researcher & ethical hacker. Expertise in OSINT, red/blue team ops, network security, RF hacking, programming. Committed to making a positive impact, ensurin...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:A simple and quick way to check if your SQL Developer by Oracle is vulnerable to SQL Injection (CVE-2023-3163), most commonly occurs when SQL Developer version < 23.1.0.
URL:https://github.com/George0Papasotiriou/CVE-2023-3163-SQL-Injection-Prevention
标签:#CVE-2023
更新了:CVE-2023
描述:A simple and quick way to check if your SQL Developer by Oracle is vulnerable to SQL Injection (CVE-2023-3163), most commonly occurs when SQL Developer version < 23.1.0.
URL:https://github.com/George0Papasotiriou/CVE-2023-3163-SQL-Injection-Prevention
标签:#CVE-2023
GitHub
GitHub - George0Papasotiriou/CVE-2023-3163-SQL-Injection-Prevention: A simple and quick way to check if your SQL Developer by Oracle…
A simple and quick way to check if your SQL Developer by Oracle is vulnerable to SQL Injection (CVE-2023-3163), most commonly occurs when SQL Developer version < 23.1.0. - George0Papasotirio...
👍1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:A actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software, tracked as CVE-2023-34362, to steal data from organizations.
URL:https://github.com/CyberKendra/MoveIt-Victims-List
标签:#CVE-2023
更新了:CVE-2023
描述:A actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software, tracked as CVE-2023-34362, to steal data from organizations.
URL:https://github.com/CyberKendra/MoveIt-Victims-List
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔴👩💻 This repository is designed to provide a simplified approach to understanding 🔴♔Red Team♔🔴
URL:https://github.com/arharif/Red-Teaming
标签:#Red Team
更新了:Red Team
描述:🔴👩💻 This repository is designed to provide a simplified approach to understanding 🔴♔Red Team♔🔴
URL:https://github.com/arharif/Red-Teaming
标签:#Red Team
GitHub监控消息提醒!!!
更新了:Red Team
描述:Programs I wrote for Red Teaming
URL:https://github.com/w01verine/Red-Teaming
标签:#Red Team
更新了:Red Team
描述:Programs I wrote for Red Teaming
URL:https://github.com/w01verine/Red-Teaming
标签:#Red Team
GitHub
GitHub - w01verine/Red-Teaming: Programs I wrote for Red Teaming
Programs I wrote for Red Teaming. Contribute to w01verine/Red-Teaming development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Initial access for Red Team
URL:https://github.com/hegusung/Windows-Initial-Access
标签:#Red Team
更新了:Red Team
描述:Initial access for Red Team
URL:https://github.com/hegusung/Windows-Initial-Access
标签:#Red Team
GitHub
GitHub - hegusung/Windows-Initial-Access: Initial access for Red Team
Initial access for Red Team. Contribute to hegusung/Windows-Initial-Access development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:平台:Windows/Mac/Linux。涉及:桌面基线排查、软件激活破解、免杀及特权执行、主机安全加固、人文社科信息数据分析等。
URL:https://github.com/hoochanlon/ihs-simple
标签:#免杀
更新了:免杀
描述:平台:Windows/Mac/Linux。涉及:桌面基线排查、软件激活破解、免杀及特权执行、主机安全加固、人文社科信息数据分析等。
URL:https://github.com/hoochanlon/ihs-simple
标签:#免杀
GitHub
GitHub - hoochanlon/scripts: 平台:Windows/Mac/Linux。脚本语言:多种、不限;我流,按需编写。涉及:桌面基线排查、软件激活破解、免杀及特权执行、渗透式支援固件识别读写、主机账户密码空值检测、Wi-Fi密码扫描…
平台:Windows/Mac/Linux。脚本语言:多种、不限;我流,按需编写。涉及:桌面基线排查、软件激活破解、免杀及特权执行、渗透式支援固件识别读写、主机账户密码空值检测、Wi-Fi密码扫描、云主机终端安全加固、主机系统日志分析、自然语言处理、人文社科信息数据分析等。 - GitHub - hoochanlon/scripts: 平台:Windows/Mac/Linux。脚本语言:多种、...
GitHub监控消息提醒!!!
更新了:反序列化
描述:MySQL Fake Server (纯Java实现,内置常见Java反序列化Payload,支持GUI版和命令行版,提供Dockerfile)
URL:https://github.com/4ra1n/mysql-fake-server
标签:#反序列化
更新了:反序列化
描述:MySQL Fake Server (纯Java实现,内置常见Java反序列化Payload,支持GUI版和命令行版,提供Dockerfile)
URL:https://github.com/4ra1n/mysql-fake-server
标签:#反序列化
GitHub
GitHub - 4ra1n/mysql-fake-server: 纯 Java 实现的 MySQL Fake Server | 支持 GUI 版和命令行版 | 支持反序列化和文件读取的利用方式 | 支持常见的 GADGET 和自定义 GADGET 数据…
纯 Java 实现的 MySQL Fake Server | 支持 GUI 版和命令行版 | 支持反序列化和文件读取的利用方式 | 支持常见的 GADGET 和自定义 GADGET 数据 | 根据目标环境自动生成匹配的 PAYLOAD | 支持 PGSQL 和 DERBY 的利用 - GitHub - 4ra1n/mysql-fake-server: 纯 Java 实现的 MySQL Fa...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)
URL:https://github.com/murataydemir/CVE-2023-25157-and-CVE-2023-25158
标签:#CVE-2023
更新了:CVE-2023
描述:GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)
URL:https://github.com/murataydemir/CVE-2023-25157-and-CVE-2023-25158
标签:#CVE-2023
GitHub
GitHub - murataydemir/CVE-2023-25157-and-CVE-2023-25158: GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)
GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158) - murataydemir/CVE-2023-25157-and-CVE-2023-25158
GitHub监控消息提醒!!!
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/NgxuAnGMH/github-DNS
标签:#绕过
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/NgxuAnGMH/github-DNS
标签:#绕过
GitHub
GitHub - NgxuAnGMH/github-DNS: 自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。 - NgxuAnGMH/github-DNS
GitHub监控消息提醒!!!
更新了:Red Team
描述:Tools & TTP's for Active Directory Red Teaming
URL:https://github.com/samay825/Wp-Lk-Sincrypt
标签:#Red Team
更新了:Red Team
描述:Tools & TTP's for Active Directory Red Teaming
URL:https://github.com/samay825/Wp-Lk-Sincrypt
标签:#Red Team