GitHub监控消息提醒!!!
更新了:CVE-2023
描述:PowerShell script to apply Zenbleed (CVE-2023-20593) MSR workaround on Windows
URL:https://github.com/sbaresearch/stop-zenbleed-win
标签:#CVE-2023
更新了:CVE-2023
描述:PowerShell script to apply Zenbleed (CVE-2023-20593) MSR workaround on Windows
URL:https://github.com/sbaresearch/stop-zenbleed-win
标签:#CVE-2023
GitHub
GitHub - sbaresearch/stop-zenbleed-win: PowerShell script to apply Zenbleed (CVE-2023-20593) MSR workaround on Windows
PowerShell script to apply Zenbleed (CVE-2023-20593) MSR workaround on Windows - sbaresearch/stop-zenbleed-win
GitHub监控消息提醒!!!
更新了:反序列化
描述:盘古框架Pulsar MQ系统集成,提供更友好的API接口,同时支持如下功能:1、易于接入;2、提供多种序列化和反序列化(包括:Protobuf、JSON、XML以及Msgpack);3、多集群接入
URL:https://github.com/pangum/pulsar
标签:#反序列化
更新了:反序列化
描述:盘古框架Pulsar MQ系统集成,提供更友好的API接口,同时支持如下功能:1、易于接入;2、提供多种序列化和反序列化(包括:Protobuf、JSON、XML以及Msgpack);3、多集群接入
URL:https://github.com/pangum/pulsar
标签:#反序列化
GitHub
GitHub - pangum/pulsar: 盘古框架Pulsar MQ系统集成,提供更友好的API接口,同时支持如下功能:1、易于接入;2、提供多种序列化和反序列化(包括:Protobuf、JSON、XML以及Msgpack);3、多集群接入
盘古框架Pulsar MQ系统集成,提供更友好的API接口,同时支持如下功能:1、易于接入;2、提供多种序列化和反序列化(包括:Protobuf、JSON、XML以及Msgpack);3、多集群接入 - GitHub - pangum/pulsar: 盘古框架Pulsar MQ系统集成,提供更友好的API接口,同时支持如下功能:1、易于接入;2、提供多种序列化和反序列化(包括:Protobu...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Tools and Techniques for Red Team / Penetration Testing
URL:https://github.com/ice-wzl/Hacknetics
标签:#Red Team
更新了:Red Team
描述:Tools and Techniques for Red Team / Penetration Testing
URL:https://github.com/ice-wzl/Hacknetics
标签:#Red Team
GitHub
GitHub - ice-wzl/Hacknetics: Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop…
Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and high level strategy. One simple clone and you have access to...
❤2
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Easy and non-intrusive script to check for CVE-2023-35078
URL:https://github.com/synfinner/CVE-2023-35078
标签:#CVE-2023
更新了:CVE-2023
描述:Easy and non-intrusive script to check for CVE-2023-35078
URL:https://github.com/synfinner/CVE-2023-35078
标签:#CVE-2023
GitHub
GitHub - synfinner/CVE-2023-35078: Easy and non-intrusive script to check for CVE-2023-35078
Easy and non-intrusive script to check for CVE-2023-35078 - synfinner/CVE-2023-35078
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-1112 Auto Exploiter
URL:https://github.com/codeb0ss/CVE-2023-1112-EXP
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-1112 Auto Exploiter
URL:https://github.com/codeb0ss/CVE-2023-1112-EXP
标签:#CVE-2023
GitHub
GitHub - codeb0ss/CVE-2023-1112-EXP: CVE-2023-1112 Auto Exploiter
CVE-2023-1112 Auto Exploiter. Contribute to codeb0ss/CVE-2023-1112-EXP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:A zenbleed (CVE-2023-20593) POC for windows
URL:https://github.com/w1redch4d/windowz2-bleed
标签:#CVE-2023
更新了:CVE-2023
描述:A zenbleed (CVE-2023-20593) POC for windows
URL:https://github.com/w1redch4d/windowz2-bleed
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Nmap script to exploit CVE-2023-35078 - Mobile Iron Core
URL:https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit
标签:#CVE-2023
更新了:CVE-2023
描述:Nmap script to exploit CVE-2023-35078 - Mobile Iron Core
URL:https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit
标签:#CVE-2023
GitHub
GitHub - emanueldosreis/nmap-CVE-2023-35078-Exploit: Nmap script to exploit CVE-2023-35078 - Mobile Iron Core
Nmap script to exploit CVE-2023-35078 - Mobile Iron Core - emanueldosreis/nmap-CVE-2023-35078-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Nmap NSE script to dump / test Solarwinds CVE-2023-23333 vulnerability
URL:https://github.com/emanueldosreis/nmap-CVE-2023-23333-exploit
标签:#CVE-2023
更新了:CVE-2023
描述:Nmap NSE script to dump / test Solarwinds CVE-2023-23333 vulnerability
URL:https://github.com/emanueldosreis/nmap-CVE-2023-23333-exploit
标签:#CVE-2023
GitHub
GitHub - emanueldosreis/nmap-CVE-2023-23333-exploit: Nmap NSE script to dump / test Solarwinds CVE-2023-23333 vulnerability
Nmap NSE script to dump / test Solarwinds CVE-2023-23333 vulnerability - emanueldosreis/nmap-CVE-2023-23333-exploit
👍1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-2333-EXP
URL:https://github.com/codeb0ss/CVE-2023-2333-EXP
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-2333-EXP
URL:https://github.com/codeb0ss/CVE-2023-2333-EXP
标签:#CVE-2023
GitHub
GitHub - codeb0ss/CVE-2023-2333-EXP: CVE-2023-2333-EXP
CVE-2023-2333-EXP. Contribute to codeb0ss/CVE-2023-2333-EXP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:Windows通用免杀shellcode生成器,能够绕过Microsoft Defender、360、火绒、Panda等杀软的查杀。
URL:https://github.com/SecurityAnalysts01/shellcodemaker-Bypass
标签:#免杀
更新了:免杀
描述:Windows通用免杀shellcode生成器,能够绕过Microsoft Defender、360、火绒、Panda等杀软的查杀。
URL:https://github.com/SecurityAnalysts01/shellcodemaker-Bypass
标签:#免杀
GitHub
GitHub - SecurityAnalysts01/ShellcodeLoader: Windows通用免杀shellcode生成器,能够绕过Microsoft Defender、360、火绒、Panda等杀软的查杀。
Windows通用免杀shellcode生成器,能够绕过Microsoft Defender、360、火绒、Panda等杀软的查杀。 - SecurityAnalysts01/ShellcodeLoader
❤1
GitHub监控消息提醒!!!
更新了:免杀
描述:Windows通用免杀shellcode生成器,能够绕过Microsoft Defender、360、火绒、Panda等杀软的查杀。
URL:https://github.com/SecurityAnalysts01/ShellcodeLoader
标签:#免杀
更新了:免杀
描述:Windows通用免杀shellcode生成器,能够绕过Microsoft Defender、360、火绒、Panda等杀软的查杀。
URL:https://github.com/SecurityAnalysts01/ShellcodeLoader
标签:#免杀
GitHub
GitHub - SecurityAnalysts01/ShellcodeLoader: Windows通用免杀shellcode生成器,能够绕过Microsoft Defender、360、火绒、Panda等杀软的查杀。
Windows通用免杀shellcode生成器,能够绕过Microsoft Defender、360、火绒、Panda等杀软的查杀。 - SecurityAnalysts01/ShellcodeLoader
GitHub监控消息提醒!!!
更新了:内网渗透
描述:通过windows的DCOM接口进行网卡进行信息枚举,无需认证,只要目标的135端口开放即可获得信息。可以有效提高内网渗透的效率,定位多网卡主机。
URL:https://github.com/canc3s/OXID
标签:#内网渗透
更新了:内网渗透
描述:通过windows的DCOM接口进行网卡进行信息枚举,无需认证,只要目标的135端口开放即可获得信息。可以有效提高内网渗透的效率,定位多网卡主机。
URL:https://github.com/canc3s/OXID
标签:#内网渗透
GitHub
GitHub - canc3s/OXID: 通过windows的DCOM接口进行网卡进行信息枚举,无需认证,只要目标的135端口开放即可获得信息。可以有效提高内网渗透的效率,定位多网卡主机。
通过windows的DCOM接口进行网卡进行信息枚举,无需认证,只要目标的135端口开放即可获得信息。可以有效提高内网渗透的效率,定位多网卡主机。 - canc3s/OXID
GitHub监控消息提醒!!!
更新了:webshell
描述:Encoder PHP webshell to bypass WAF using XOR operations.
URL:https://github.com/GgBoom-993/xorshell
标签:#webshell
更新了:webshell
描述:Encoder PHP webshell to bypass WAF using XOR operations.
URL:https://github.com/GgBoom-993/xorshell
标签:#webshell
GitHub
GitHub - GgBoom-993/xorshell: Encoder PHP webshell to bypass WAF using XOR operations.
Encoder PHP webshell to bypass WAF using XOR operations. - GgBoom-993/xorshell
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-22884 PoC
URL:https://github.com/jakabakos/CVE-2023-22884-Airflow-SQLi
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-22884 PoC
URL:https://github.com/jakabakos/CVE-2023-22884-Airflow-SQLi
标签:#CVE-2023
GitHub
GitHub - jakabakos/CVE-2023-22884-Airflow-SQLi: CVE-2023-22884 PoC
CVE-2023-22884 PoC. Contribute to jakabakos/CVE-2023-22884-Airflow-SQLi development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:Encoder PHP webshell to bypass WAF using XOR operations.
URL:https://github.com/tucommenceapousser/xor
标签:#webshell
更新了:webshell
描述:Encoder PHP webshell to bypass WAF using XOR operations.
URL:https://github.com/tucommenceapousser/xor
标签:#webshell
GitHub
GitHub - tucommenceapousser/xor: Encoder PHP webshell to bypass WAF using XOR operations.
Encoder PHP webshell to bypass WAF using XOR operations. - GitHub - tucommenceapousser/xor: Encoder PHP webshell to bypass WAF using XOR operations.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:lineadd 渗透测试字典管理工具, 让字典管理生活轻松一点。Penetration test dictionary management tool, make dictionary management life a little easier.
URL:https://github.com/ttstormxx/lineadd
标签:#渗透测试
更新了:渗透测试
描述:lineadd 渗透测试字典管理工具, 让字典管理生活轻松一点。Penetration test dictionary management tool, make dictionary management life a little easier.
URL:https://github.com/ttstormxx/lineadd
标签:#渗透测试
GitHub
GitHub - ttstormxx/lineadd: lineadd 渗透测试字典管理工具, 让字典管理生活轻松一点。Penetration test dictionary management tool, make dictionary management…
lineadd 渗透测试字典管理工具, 让字典管理生活轻松一点。Penetration test dictionary management tool, make dictionary management life a little easier. - ttstormxx/lineadd
GitHub监控消息提醒!!!
更新了:webshell
描述:A webshell that can bypass some system security
URL:https://github.com/22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor
标签:#webshell
更新了:webshell
描述:A webshell that can bypass some system security
URL:https://github.com/22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor
标签:#webshell
GitHub
GitHub - 22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor: A webshell that can bypass some system security, all code has been obfuscated…
A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely. - 22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor
GitHub监控消息提醒!!!
更新了:webshell
描述:Simple webshell made in php
URL:https://github.com/FromAbbys/simple_web_shell
标签:#webshell
更新了:webshell
描述:Simple webshell made in php
URL:https://github.com/FromAbbys/simple_web_shell
标签:#webshell
GitHub
GitHub - FromAbbys/simple_web_shell: Simple webshell made in php
Simple webshell made in php. Contribute to FromAbbys/simple_web_shell development by creating an account on GitHub.
👎2
GitHub监控消息提醒!!!
更新了:Red Team
描述:Penetration Testing, Vulnerability Assessment and Red Team Learning
URL:https://github.com/nengyi1226/RedTeamPasswd
标签:#Red Team
更新了:Red Team
描述:Penetration Testing, Vulnerability Assessment and Red Team Learning
URL:https://github.com/nengyi1226/RedTeamPasswd
标签:#Red Team
GitHub
GitHub - nengyi1226/RedTeamPasswd: The directed brute force cracking tool, after collecting information, uses it to generate a…
The directed brute force cracking tool, after collecting information, uses it to generate a special dictionary containing the feature information of the target, so that each piece of data in the di...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-38646-POC
URL:https://github.com/fidjiw/CVE-2023-38646-POC
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-38646-POC
URL:https://github.com/fidjiw/CVE-2023-38646-POC
标签:#CVE-2023
GitHub
GitHub - fidjiw/CVE-2023-38646-POC: CVE-2023-38646-POC
CVE-2023-38646-POC. Contribute to fidjiw/CVE-2023-38646-POC development by creating an account on GitHub.