GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike script for ScareCrow payloads (EDR/AV evasion)
URL:https://github.com/GeorgePatsias/ScareCrow-CobaltStrike
更新了:Cobalt Strike
描述:Cobalt Strike script for ScareCrow payloads (EDR/AV evasion)
URL:https://github.com/GeorgePatsias/ScareCrow-CobaltStrike
GitHub
GitHub - GeorgePatsias/ScareCrow-CobaltStrike: Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)
Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion) - GeorgePatsias/ScareCrow-CobaltStrike
GitHub监控消息提醒!!!
更新了:Red Team
描述:Super User Sus, an evil script for Red Teams in competitions
URL:https://github.com/ChallengeVictory/SUS
更新了:Red Team
描述:Super User Sus, an evil script for Red Teams in competitions
URL:https://github.com/ChallengeVictory/SUS
GitHub
GitHub - Bardificer/SUS: Super User Sus, an evil script for Red Teams in competitions
Super User Sus, an evil script for Red Teams in competitions - GitHub - Bardificer/SUS: Super User Sus, an evil script for Red Teams in competitions
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS)
URL:https://github.com/5qu1n7/CVE-2021-40492
更新了:CVE-2021
描述:CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS)
URL:https://github.com/5qu1n7/CVE-2021-40492
GitHub
GitHub - 5qu1n7/CVE-2021-40492: CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS)
CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS) - GitHub - 5qu1n7/CVE-2021-40492: CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS)
GitHub监控消息提醒!!!
更新了:Red Team
描述:notes for Red Team Exams
URL:https://github.com/kyleAW/Red-Team-Exam-Notes
更新了:Red Team
描述:notes for Red Team Exams
URL:https://github.com/kyleAW/Red-Team-Exam-Notes
GitHub
GitHub - kyleAW/Red-Team-Exam-Notes: notes for Red Team Exams
notes for Red Team Exams. Contribute to kyleAW/Red-Team-Exam-Notes development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Backporting CVE-2021-1748 patch for iOS <=14.3
URL:https://github.com/ChiChou/mistune-patch-backport
更新了:CVE-2021
描述:Backporting CVE-2021-1748 patch for iOS <=14.3
URL:https://github.com/ChiChou/mistune-patch-backport
GitHub
GitHub - ChiChou/mistune-patch-backport: Backporting CVE-2021-1748 patch for iOS <=14.3
Backporting CVE-2021-1748 patch for iOS <=14.3. Contribute to ChiChou/mistune-patch-backport development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Backporting CVE-2021-1748 patch for iOS <=14.3
URL:https://github.com/AlAIAL90/CVE-2021-37608
更新了:CVE-2021
描述:Backporting CVE-2021-1748 patch for iOS <=14.3
URL:https://github.com/AlAIAL90/CVE-2021-37608
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC for exploiting CVE-2021-32955 : Delta Electronics DIAEnergie Version 1.7.5 and prior allows unrestricted file uploads, which may allow an attacker to remotely execute code.
URL:https://github.com/AlAIAL90/CVE-2021-1588
更新了:CVE-2021
描述:PoC for exploiting CVE-2021-32955 : Delta Electronics DIAEnergie Version 1.7.5 and prior allows unrestricted file uploads, which may allow an attacker to remotely execute code.
URL:https://github.com/AlAIAL90/CVE-2021-1588
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Confluence OGNL Injection [CVE-2021-26084].
URL:https://github.com/march0s1as/CVE-2021-26084
更新了:CVE-2021
描述:Confluence OGNL Injection [CVE-2021-26084].
URL:https://github.com/march0s1as/CVE-2021-26084
GitHub
GitHub - march0s1as/CVE-2021-26084: Confluence OGNL Injection [CVE-2021-26084].
Confluence OGNL Injection [CVE-2021-26084]. Contribute to march0s1as/CVE-2021-26084 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Setting up POC for CVE-2021-26084
URL:https://github.com/wolf1892/confluence-rce-poc
更新了:CVE-2021
描述:Setting up POC for CVE-2021-26084
URL:https://github.com/wolf1892/confluence-rce-poc
GitHub
GitHub - wolf1892/confluence-rce-poc: Setting up POC for CVE-2021-26084
Setting up POC for CVE-2021-26084. Contribute to wolf1892/confluence-rce-poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
URL:https://github.com/quantumcore/remote_hacker_probe
更新了:Red Team
描述:Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
URL:https://github.com/quantumcore/remote_hacker_probe
GitHub
GitHub - quantumcore/remote_hacker_probe: Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.
Threat Emulation and Red Teaming Framework, The Hacking Software for normal people. - quantumcore/remote_hacker_probe
GitHub监控消息提醒!!!
更新了:Red Team
描述:A microservice for exploring the Atomic Red Team framework
URL:https://github.com/whitfieldsdad/python-atomic-red-team-microservice
更新了:Red Team
描述:A microservice for exploring the Atomic Red Team framework
URL:https://github.com/whitfieldsdad/python-atomic-red-team-microservice
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teamming together.
URL:https://github.com/signorrayan/RedTeam_toolkit
更新了:Red Team
描述:Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teamming together.
URL:https://github.com/signorrayan/RedTeam_toolkit
GitHub
GitHub - signorrayan/RedTeam_toolkit: Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive…
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together. - signorrayan/RedTeam_toolkit
GitHub监控消息提醒!!!
更新了:Red Team
描述:A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and Security Filtering
URL:https://github.com/Dliv3/SharpGPO
更新了:Red Team
描述:A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and Security Filtering
URL:https://github.com/Dliv3/SharpGPO
GitHub
GitHub - Dliv3/SharpGPO: A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and…
A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and Security Filtering - Dliv3/SharpGPO
GitHub监控消息提醒!!!
更新了:Red Team
描述:Penetration Testing & Red Team tools & scripts
URL:https://github.com/zruvv/Penny-Testing-Tools
更新了:Red Team
描述:Penetration Testing & Red Team tools & scripts
URL:https://github.com/zruvv/Penny-Testing-Tools
GitHub
GitHub - zruvv/Penny-Testing-Tools: Penetration Testing & Red Team tools & scripts
Penetration Testing & Red Team tools & scripts. Contribute to zruvv/Penny-Testing-Tools development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:应急响应,应急响应脚本,应急响应批处理;将Windows查看日志用户端口等命令集成在批处理脚本中。让熟练的应急人员能省去多次重复的敲击和记忆,并通过读取配置文件来调用Windows自带的命令结束进程服务等,本批处理尽量不调用任何外部的工具。任何调用的外部工具都将会存放在plugin目录下可按需使用,力图使用最原生的命令行来完成工作。
URL:https://github.com/0xbinibini/emergency_response_batch
更新了:应急响应
描述:应急响应,应急响应脚本,应急响应批处理;将Windows查看日志用户端口等命令集成在批处理脚本中。让熟练的应急人员能省去多次重复的敲击和记忆,并通过读取配置文件来调用Windows自带的命令结束进程服务等,本批处理尽量不调用任何外部的工具。任何调用的外部工具都将会存放在plugin目录下可按需使用,力图使用最原生的命令行来完成工作。
URL:https://github.com/0xbinibini/emergency_response_batch
GitHub
GitHub - 0xbinibini/emergency_response_batch: 应急响应,应急响应脚本,应急响应批处理;将Windows查看日志用户端口等命令集成在批处理脚本中。让熟练的应急人员能省去多次重复的敲击和记忆,并通过读取配置文件…
应急响应,应急响应脚本,应急响应批处理;将Windows查看日志用户端口等命令集成在批处理脚本中。让熟练的应急人员能省去多次重复的敲击和记忆,并通过读取配置文件来调用Windows自带的命令结束进程服务等,本批处理尽量不调用任何外部的工具。任何调用的外部工具都将会存放在plugin目录下可按需使用,力图使用最原生的命令行来完成工作。 - GitHub - 0xbinibini/emergen...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Malicious document builder for CVE-2021-40444
URL:https://github.com/amartinsec/MSHTMHell
更新了:CVE-2021
描述:Malicious document builder for CVE-2021-40444
URL:https://github.com/amartinsec/MSHTMHell
GitHub
GitHub - amartinsec/MSHTMHell: Malicious document builder for CVE-2021-40444
Malicious document builder for CVE-2021-40444 . Contribute to amartinsec/MSHTMHell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
URL:https://github.com/BlackSnufkin/PT-ToolKit
更新了:Red Team
描述:Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
URL:https://github.com/BlackSnufkin/PT-ToolKit
GitHub
GitHub - BlackSnufkin/PT-ToolKit: Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement - GitHub - BlackSnufkin/PT-ToolKit: Exploits Scripts and other tools that are useful during Penet...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-3156: Sudo heap overflow exploit for Debian 10
URL:https://github.com/0xdevil/CVE-2021-3156
更新了:CVE-2021
描述:CVE-2021-3156: Sudo heap overflow exploit for Debian 10
URL:https://github.com/0xdevil/CVE-2021-3156
GitHub
GitHub - 0xdevil/CVE-2021-3156: CVE-2021-3156: Sudo heap overflow exploit for Debian 10
CVE-2021-3156: Sudo heap overflow exploit for Debian 10 - 0xdevil/CVE-2021-3156
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teamming together.
URL:https://github.com/knight0x07/ImpulsiveDLLHijack
更新了:Red Team
描述:Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teamming together.
URL:https://github.com/knight0x07/ImpulsiveDLLHijack
GitHub
GitHub - knight0x07/ImpulsiveDLLHijack: C# based tool which automates the process of discovering and exploiting DLL Hijacks in…
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR...