GitHub监控消息提醒!!!
更新了:内存马
描述:一款高性能 HTTP 内存代理 | 哥斯拉插件 | readteam | 红队 | 内存马 | Suo5 | Godzilla
URL:https://github.com/TonyNPham/GodzillaPlugin-Suo5-MemProxy
标签:#内存马
更新了:内存马
描述:一款高性能 HTTP 内存代理 | 哥斯拉插件 | readteam | 红队 | 内存马 | Suo5 | Godzilla
URL:https://github.com/TonyNPham/GodzillaPlugin-Suo5-MemProxy
标签:#内存马
GitHub
GitHub - TonyNPham/GodzillaPlugin-Suo5-MemProxy: 一款高性能 HTTP 内存代理 | 哥斯拉插件 | readteam | 红队 | 内存马 | Suo5 | Godzilla | 正向代理
一款高性能 HTTP 内存代理 | 哥斯拉插件 | readteam | 红队 | 内存马 | Suo5 | Godzilla | 正向代理 - TonyNPham/GodzillaPlugin-Suo5-MemProxy
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:自动化进行资产探测及漏洞扫描|红蓝对抗 | 快速打点 | 适用黑客进行赏金活动、SRC活动、大规模攻击使用 | 护网
URL:https://github.com/Londly01/Londly01
标签:#红蓝对抗
更新了:红蓝对抗
描述:自动化进行资产探测及漏洞扫描|红蓝对抗 | 快速打点 | 适用黑客进行赏金活动、SRC活动、大规模攻击使用 | 护网
URL:https://github.com/Londly01/Londly01
标签:#红蓝对抗
GitHub
GitHub - Londly01/Londly01: 自动化进行资产探测及漏洞扫描|红蓝对抗 | 快速打点 | 适用黑客进行赏金活动、SRC活动、大规模攻击使用 | 护网
自动化进行资产探测及漏洞扫描|红蓝对抗 | 快速打点 | 适用黑客进行赏金活动、SRC活动、大规模攻击使用 | 护网 - GitHub - Londly01/Londly01: 自动化进行资产探测及漏洞扫描|红蓝对抗 | 快速打点 | 适用黑客进行赏金活动、SRC活动、大规模攻击使用 | 护网
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.
URL:https://github.com/jnqpblc/SharpSvc
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.
URL:https://github.com/jnqpblc/SharpSvc
标签:#Cobalt Strike
GitHub
GitHub - jnqpblc/SharpSvc: SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.
SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike. - GitHub - jnqpblc/SharpSvc: SharpSvc is a simple code set to interact with the SC Manager AP...
❤1
GitHub监控消息提醒!!!
更新了:Red Team
描述:The source code of the DEF CON Red Team Offense Village website
URL:https://github.com/Astaruf/BadArduino
标签:#Red Team
更新了:Red Team
描述:The source code of the DEF CON Red Team Offense Village website
URL:https://github.com/Astaruf/BadArduino
标签:#Red Team
GitHub
GitHub - Astaruf/BadArduino: Using Arduino to spread malicious code via BadUSB attack. This project involves the setup and construction…
Using Arduino to spread malicious code via BadUSB attack. This project involves the setup and construction of a potentially harmful fake external storage device, designed to execute arbitrary code ...
GitHub监控消息提醒!!!
更新了:免杀
描述:Powershell shellcode one-liner. Powershell免杀一句话上线器便捷生成
URL:https://github.com/baiyies/PowerOneLiner
标签:#免杀
更新了:免杀
描述:Powershell shellcode one-liner. Powershell免杀一句话上线器便捷生成
URL:https://github.com/baiyies/PowerOneLiner
标签:#免杀
GitHub
GitHub - baiyies/PowerOneLiner: Powershell shellcode one-liner. Powershell免杀一句话上线器便捷生成
Powershell shellcode one-liner. Powershell免杀一句话上线器便捷生成 - baiyies/PowerOneLiner
🥰2👍1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-30533
URL:https://github.com/BenEdridge/CVE-2023-30533
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-30533
URL:https://github.com/BenEdridge/CVE-2023-30533
标签:#CVE-2023
GitHub
GitHub - BenEdridge/CVE-2023-30533: There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)
There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin) - BenEdridge/CVE-2023-30533
GitHub监控消息提醒!!!
更新了:红队
描述:云环境利用框架(Cloud exploitation framework)主要用来方便红队人员在获得 AK 的后续工作。
URL:https://github.com/0xorOne/cf
标签:#红队
更新了:红队
描述:云环境利用框架(Cloud exploitation framework)主要用来方便红队人员在获得 AK 的后续工作。
URL:https://github.com/0xorOne/cf
标签:#红队
GitHub
GitHub - 0xorOne/cf: 云环境利用框架(Cloud exploitation framework)主要用来方便红队人员在获得 AK 的后续工作。
云环境利用框架(Cloud exploitation framework)主要用来方便红队人员在获得 AK 的后续工作。 - GitHub - 0xorOne/cf: 云环境利用框架(Cloud exploitation framework)主要用来方便红队人员在获得 AK 的后续工作。
❤1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Automatic Tools For Metabase Exploit Known As CVE-2023-38646
URL:https://github.com/robotmikhro/CVE-2023-38646
标签:#CVE-2023
更新了:CVE-2023
描述:Automatic Tools For Metabase Exploit Known As CVE-2023-38646
URL:https://github.com/robotmikhro/CVE-2023-38646
标签:#CVE-2023
GitHub
GitHub - robotmikhro/CVE-2023-38646: Automatic Tools For Metabase Exploit Known As CVE-2023-38646
Automatic Tools For Metabase Exploit Known As CVE-2023-38646 - robotmikhro/CVE-2023-38646
GitHub监控消息提醒!!!
更新了:webshell
描述:This is a webshell open source project. Src: https://github.com/tennc/webshell.git
URL:https://github.com/emtee40/webshells
标签:#webshell
更新了:webshell
描述:This is a webshell open source project. Src: https://github.com/tennc/webshell.git
URL:https://github.com/emtee40/webshells
标签:#webshell
GitHub
GitHub - tennc/webshell: This is a webshell open source project
This is a webshell open source project. Contribute to tennc/webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内网渗透
描述:内网渗透实验环境,NTLM、KERBEROS协议的PCAP包
URL:https://github.com/ainrm/ntlm-kerberos-pcap
标签:#内网渗透
更新了:内网渗透
描述:内网渗透实验环境,NTLM、KERBEROS协议的PCAP包
URL:https://github.com/ainrm/ntlm-kerberos-pcap
标签:#内网渗透
GitHub
GitHub - ainrm/ntlm-kerberos-pcap: ntlm、kerberos协议的PCAP包
ntlm、kerberos协议的PCAP包. Contribute to ainrm/ntlm-kerberos-pcap development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass av
描述:Simple powershell reverse shell that bypass av
URL:https://github.com/Gesus-del/rev_shell
标签:#bypass av
更新了:bypass av
描述:Simple powershell reverse shell that bypass av
URL:https://github.com/Gesus-del/rev_shell
标签:#bypass av
GitHub
GitHub - Gesus-del/rev_shell: Simple powershell reverse shell that bypass av
Simple powershell reverse shell that bypass av. Contribute to Gesus-del/rev_shell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:GitHubScrap is a simple Python 3 script that automates GitHub OSINT during early stages of Red Team exercises
URL:https://github.com/earmstrong1/Redone101
标签:#Red Team
更新了:Red Team
描述:GitHubScrap is a simple Python 3 script that automates GitHub OSINT during early stages of Red Team exercises
URL:https://github.com/earmstrong1/Redone101
标签:#Red Team
GitHub
earmstrong1/Redone101
This repo contains files from hackHer's 2022 hackathon. The theme of the hackathon this year was sustainability. My team and I created "Redone101"; a clothing website wher...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527
URL:https://github.com/dnkhack/fixcve2023_39526_2023_39527
标签:#CVE-2023
更新了:CVE-2023
描述:Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527
URL:https://github.com/dnkhack/fixcve2023_39526_2023_39527
标签:#CVE-2023
GitHub
GitHub - dnkhack/fixcve2023_39526_2023_39527: Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527
Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527 - GitHub - dnkhack/fixcve2023_39526_2023_39527: Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527
GitHub监控消息提醒!!!
更新了:Red Team
描述:Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
URL:https://github.com/KCarretto/realm
标签:#Red Team
更新了:Red Team
描述:Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
URL:https://github.com/KCarretto/realm
标签:#Red Team
GitHub
GitHub - spellshift/realm: Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability. - spellshift/realm
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:This tool is built in golang language to exploit CVE-2023-35078 vulnerability inspired by similar tool in python language https://github.com/vchan-in/CVE-2023-35078-Exploit-POC
URL:https://github.com/LazyySec/CVE-2023-35078
标签:#CVE-2023
更新了:CVE-2023
描述:This tool is built in golang language to exploit CVE-2023-35078 vulnerability inspired by similar tool in python language https://github.com/vchan-in/CVE-2023-35078-Exploit-POC
URL:https://github.com/LazyySec/CVE-2023-35078
标签:#CVE-2023
GitHub
GitHub - vchan-in/CVE-2023-35078-Exploit-POC: CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC
CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC - vchan-in/CVE-2023-35078-Exploit-POC
GitHub监控消息提醒!!!
更新了:Red Team
描述:DefCon Red Team Village 2023 Workshop on DLL Sideloading
URL:https://github.com/mwnickerson/RedTeamVillage2023-DLL-Sideloading
标签:#Red Team
更新了:Red Team
描述:DefCon Red Team Village 2023 Workshop on DLL Sideloading
URL:https://github.com/mwnickerson/RedTeamVillage2023-DLL-Sideloading
标签:#Red Team
GitHub
GitHub - mwnickerson/RedTeamVillage2023-DLL-Sideloading: DefCon Red Team Village 2023 Workshop on DLL Sideloading
DefCon Red Team Village 2023 Workshop on DLL Sideloading - mwnickerson/RedTeamVillage2023-DLL-Sideloading
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-4174 PoC
URL:https://github.com/d0rb/CVE-2023-4174
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-4174 PoC
URL:https://github.com/d0rb/CVE-2023-4174
标签:#CVE-2023
GitHub
GitHub - d0rb/CVE-2023-4174: CVE-2023-4174 PoC
CVE-2023-4174 PoC. Contribute to d0rb/CVE-2023-4174 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:使用 Termux 执行这个脚本来安装资源包以绕过登录对话框
URL:https://github.com/Webpage-gh/Bypass-MC-Education-Edition-login
标签:#绕过
更新了:绕过
描述:使用 Termux 执行这个脚本来安装资源包以绕过登录对话框
URL:https://github.com/Webpage-gh/Bypass-MC-Education-Edition-login
标签:#绕过
GitHub监控消息提醒!!!
更新了:webshell
描述:Membersihkan folder yang sudah kena webshell [403WebShell](https://github.com/yon3zu/403WebShell/tree/main) atau sejenisnya.
URL:https://github.com/3vluzi/Hapus-File-dan-Folder-Webshell
标签:#webshell
更新了:webshell
描述:Membersihkan folder yang sudah kena webshell [403WebShell](https://github.com/yon3zu/403WebShell/tree/main) atau sejenisnya.
URL:https://github.com/3vluzi/Hapus-File-dan-Folder-Webshell
标签:#webshell
GitHub
GitHub - yon3zu/403WebShell: 99% Bypassed Litespeed Server / 403 Forbidden
99% Bypassed Litespeed Server / 403 Forbidden. Contribute to yon3zu/403WebShell development by creating an account on GitHub.