GitHub监控消息提醒!!!
更新了:内存马
描述:一款支持高度自定义的 Java 内存马生成工具
URL:https://github.com/pen4uin/java-memshell-generator-release
标签:#内存马
更新了:内存马
描述:一款支持高度自定义的 Java 内存马生成工具
URL:https://github.com/pen4uin/java-memshell-generator-release
标签:#内存马
GitHub
GitHub - pen4uin/java-memshell-generator: 一款支持自定义的 Java 内存马生成工具|A customizable Java in-memory webshell generation tool.
一款支持自定义的 Java 内存马生成工具|A customizable Java in-memory webshell generation tool. - pen4uin/java-memshell-generator
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-38831-WINRAR-EXPLOIT GENERATOR
URL:https://github.com/K3rnel-Dev/WinrarExploit
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-38831-WINRAR-EXPLOIT GENERATOR
URL:https://github.com/K3rnel-Dev/WinrarExploit
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:反序列化
描述:像oicq-js哪样快速的解析protobuf,本项目不支持序列化,仅支持反序列化。
URL:https://github.com/fuqiuluo/fastprotobuf
标签:#反序列化
更新了:反序列化
描述:像oicq-js哪样快速的解析protobuf,本项目不支持序列化,仅支持反序列化。
URL:https://github.com/fuqiuluo/fastprotobuf
标签:#反序列化
GitHub
GitHub - fuqiuluo/fastprotobuf: 像oicq-js哪样快速的解析protobuf,支持序列化/反序列化。
像oicq-js哪样快速的解析protobuf,支持序列化/反序列化。. Contribute to fuqiuluo/fastprotobuf development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:✉️ HTML Smuggling generator&obfuscator for your Red Team operations
URL:https://github.com/D00Movenok/HTMLSmuggler
标签:#Red Team
更新了:Red Team
描述:✉️ HTML Smuggling generator&obfuscator for your Red Team operations
URL:https://github.com/D00Movenok/HTMLSmuggler
标签:#Red Team
GitHub
GitHub - D00Movenok/HTMLSmuggler: ✉️ HTML Smuggling generator&obfuscator for your Red Team operations
✉️ HTML Smuggling generator&obfuscator for your Red Team operations - D00Movenok/HTMLSmuggler
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.
URL:https://github.com/xaitax/WinRAR-CVE-2023-38831
标签:#CVE-2023
更新了:CVE-2023
描述:This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.
URL:https://github.com/xaitax/WinRAR-CVE-2023-38831
标签:#CVE-2023
GitHub
GitHub - xaitax/WinRAR-CVE-2023-38831: This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted…
This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution. - xaitax/WinRAR-CVE...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Steps needed to obtain a reverse shell exploiting the winrar vulnerability CVE-2023-38831 in versions prior to 6.23.
URL:https://github.com/LuxCodeDev/CVE-2023-38831_WinRAR
标签:#CVE-2023
更新了:CVE-2023
描述:Steps needed to obtain a reverse shell exploiting the winrar vulnerability CVE-2023-38831 in versions prior to 6.23.
URL:https://github.com/LuxCodeDev/CVE-2023-38831_WinRAR
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:HW2023@POC@EXP@CVE-2023-2023
URL:https://github.com/GREENHAT7/Hvv2023
标签:#CVE-2023
更新了:CVE-2023
描述:HW2023@POC@EXP@CVE-2023-2023
URL:https://github.com/GREENHAT7/Hvv2023
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:webshell
描述:tomcat mem webshell demo
URL:https://github.com/pacemrc/testMemShell
标签:#webshell
更新了:webshell
描述:tomcat mem webshell demo
URL:https://github.com/pacemrc/testMemShell
标签:#webshell
GitHub
GitHub - pacemrc/testMemShell: tomcat mem webshell demo
tomcat mem webshell demo. Contribute to pacemrc/testMemShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:nftables oob read/write exploit (CVE-2023-35001)
URL:https://github.com/syedhafiz1234/nftables-oob-read-write-exploit-CVE-2023-35001-
标签:#CVE-2023
更新了:CVE-2023
描述:nftables oob read/write exploit (CVE-2023-35001)
URL:https://github.com/syedhafiz1234/nftables-oob-read-write-exploit-CVE-2023-35001-
标签:#CVE-2023
GitHub
GitHub - syedhafiz1234/nftables-oob-read-write-exploit-CVE-2023-35001-: nftables oob read/write exploit (CVE-2023-35001)
nftables oob read/write exploit (CVE-2023-35001). Contribute to syedhafiz1234/nftables-oob-read-write-exploit-CVE-2023-35001- development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-34039
URL:https://github.com/syedhafiz1234/CVE-2023-34039
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-34039
URL:https://github.com/syedhafiz1234/CVE-2023-34039
标签:#CVE-2023
GitHub
GitHub - syedhafiz1234/CVE-2023-34039: CVE-2023-34039
CVE-2023-34039. Contribute to syedhafiz1234/CVE-2023-34039 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:本项目基于RPC 通信原理使用C++编写的分布式TCP通信框架(RPC框架)。使用muduo网络库实现高并发的RPC同步调用请求处理,使用Protobuf进行序列化和反序列化,采用ZooKeeper作为服务注册配置管理中心提供服务注册和服务发现功能。
URL:https://github.com/Ge-ze/DistributedRPC
标签:#反序列化
更新了:反序列化
描述:本项目基于RPC 通信原理使用C++编写的分布式TCP通信框架(RPC框架)。使用muduo网络库实现高并发的RPC同步调用请求处理,使用Protobuf进行序列化和反序列化,采用ZooKeeper作为服务注册配置管理中心提供服务注册和服务发现功能。
URL:https://github.com/Ge-ze/DistributedRPC
标签:#反序列化
GitHub
GitHub - Ge-ze/DistributedRPC: 本项目基于RPC 通信原理使用C++编写的分布式TCP通信框架(RPC框架)。使用muduo网络库实现高并发的RPC同步调用请求处理,使用Protobuf进行序列化和反序列化,采用ZooKe…
本项目基于RPC 通信原理使用C++编写的分布式TCP通信框架(RPC框架)。使用muduo网络库实现高并发的RPC同步调用请求处理,使用Protobuf进行序列化和反序列化,采用ZooKeeper作为服务注册配置管理中心提供服务注册和服务发现功能。 - GitHub - Ge-ze/DistributedRPC: 本项目基于RPC 通信原理使用C++编写的分布式TCP通信框架(RPC框架)...
GitHub监控消息提醒!!!
更新了:Red Team
描述:A Slack bot phishing framework for Red Teaming exercises
URL:https://github.com/Drew-Sec/Slack_Attack_Framework
标签:#Red Team
更新了:Red Team
描述:A Slack bot phishing framework for Red Teaming exercises
URL:https://github.com/Drew-Sec/Slack_Attack_Framework
标签:#Red Team
GitHub
GitHub - Drew-Sec/Evil_Slackbot: A Slack bot phishing framework for Red Teaming exercises
A Slack bot phishing framework for Red Teaming exercises - GitHub - Drew-Sec/Evil_Slackbot: A Slack bot phishing framework for Red Teaming exercises
👍1
GitHub监控消息提醒!!!
更新了:Red Team
描述:A Slack bot phishing framework for Red Teaming exercises
URL:https://github.com/Drew-Sec/Evil_Slackbot
标签:#Red Team
更新了:Red Team
描述:A Slack bot phishing framework for Red Teaming exercises
URL:https://github.com/Drew-Sec/Evil_Slackbot
标签:#Red Team
GitHub
GitHub - Drew-Sec/Evil_Slackbot: A Slack bot phishing framework for Red Teaming exercises
A Slack bot phishing framework for Red Teaming exercises - GitHub - Drew-Sec/Evil_Slackbot: A Slack bot phishing framework for Red Teaming exercises
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Script to exploit CVE-2023-38035
URL:https://github.com/mind2hex/MICS_Hunter
标签:#CVE-2023
更新了:CVE-2023
描述:Script to exploit CVE-2023-38035
URL:https://github.com/mind2hex/MICS_Hunter
标签:#CVE-2023
GitHub
GitHub - mind2hex/MICS_Hunter: Script to exploit CVE-2023-38035
Script to exploit CVE-2023-38035. Contribute to mind2hex/MICS_Hunter development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-41508 - A hard-coded password in Super Store Finder v3.6 allows attackers to access the administration panel.
URL:https://github.com/redblueteam/CVE-2023-41508
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-41508 - A hard-coded password in Super Store Finder v3.6 allows attackers to access the administration panel.
URL:https://github.com/redblueteam/CVE-2023-41508
标签:#CVE-2023
GitHub
GitHub - redblueteam/CVE-2023-41508: CVE-2023-41508 - A hard-coded password in Super Store Finder v3.6 allows attackers to access…
CVE-2023-41508 - A hard-coded password in Super Store Finder v3.6 allows attackers to access the administration panel. - redblueteam/CVE-2023-41508
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-41507 A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel.
URL:https://github.com/redblueteam/CVE-2023-41507
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-41507 A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel.
URL:https://github.com/redblueteam/CVE-2023-41507
标签:#CVE-2023
GitHub
GitHub - redblueteam/CVE-2023-41507: CVE-2023-41507 A hard coded password in Super Store Finder v3.6 allows attackers to access…
CVE-2023-41507 A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel. - redblueteam/CVE-2023-41507
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Mass exploit - CVE-2023-41538 < phpjabbers PHP Forum < Cross Site Scripting (XSS)
URL:https://github.com/codeb0ss/CVE-2023-41538-PoC
标签:#CVE-2023
更新了:CVE-2023
描述:Mass exploit - CVE-2023-41538 < phpjabbers PHP Forum < Cross Site Scripting (XSS)
URL:https://github.com/codeb0ss/CVE-2023-41538-PoC
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:红队
描述:蓝队分析研判工具箱,自带的反编译工具对红队也有帮助,有建议欢迎给我留言
URL:https://github.com/abc123info/BlueTeamTools
标签:#红队
更新了:红队
描述:蓝队分析研判工具箱,自带的反编译工具对红队也有帮助,有建议欢迎给我留言
URL:https://github.com/abc123info/BlueTeamTools
标签:#红队
GitHub
GitHub - abc123info/BlueTeamTools: 蓝队分析研判工具箱,功能包括内存马反编译分析、各种代码格式化、网空资产测绘功能、溯源辅助、解密冰蝎流量、解密哥斯拉流量、解密Shiro/CAS/Log4j2的攻击payload、IP…
蓝队分析研判工具箱,功能包括内存马反编译分析、各种代码格式化、网空资产测绘功能、溯源辅助、解密冰蝎流量、解密哥斯拉流量、解密Shiro/CAS/Log4j2的攻击payload、IP/端口连接分析、各种编码/解码功能、蓝队分析常用网址、java反序列化数据包分析、Java类名搜索、Fofa搜索、Hunter搜索等。 - abc123info/BlueTeamTools