GitHub监控消息提醒!!!
更新了:Red Team
描述:A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and Security Filtering
URL:https://github.com/Dliv3/SharpGPO
更新了:Red Team
描述:A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and Security Filtering
URL:https://github.com/Dliv3/SharpGPO
GitHub
GitHub - Dliv3/SharpGPO: A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and…
A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and Security Filtering - Dliv3/SharpGPO
GitHub监控消息提醒!!!
更新了:Red Team
描述:Penetration Testing & Red Team tools & scripts
URL:https://github.com/zruvv/Penny-Testing-Tools
更新了:Red Team
描述:Penetration Testing & Red Team tools & scripts
URL:https://github.com/zruvv/Penny-Testing-Tools
GitHub
GitHub - zruvv/Penny-Testing-Tools: Penetration Testing & Red Team tools & scripts
Penetration Testing & Red Team tools & scripts. Contribute to zruvv/Penny-Testing-Tools development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:应急响应,应急响应脚本,应急响应批处理;将Windows查看日志用户端口等命令集成在批处理脚本中。让熟练的应急人员能省去多次重复的敲击和记忆,并通过读取配置文件来调用Windows自带的命令结束进程服务等,本批处理尽量不调用任何外部的工具。任何调用的外部工具都将会存放在plugin目录下可按需使用,力图使用最原生的命令行来完成工作。
URL:https://github.com/0xbinibini/emergency_response_batch
更新了:应急响应
描述:应急响应,应急响应脚本,应急响应批处理;将Windows查看日志用户端口等命令集成在批处理脚本中。让熟练的应急人员能省去多次重复的敲击和记忆,并通过读取配置文件来调用Windows自带的命令结束进程服务等,本批处理尽量不调用任何外部的工具。任何调用的外部工具都将会存放在plugin目录下可按需使用,力图使用最原生的命令行来完成工作。
URL:https://github.com/0xbinibini/emergency_response_batch
GitHub
GitHub - 0xbinibini/emergency_response_batch: 应急响应,应急响应脚本,应急响应批处理;将Windows查看日志用户端口等命令集成在批处理脚本中。让熟练的应急人员能省去多次重复的敲击和记忆,并通过读取配置文件…
应急响应,应急响应脚本,应急响应批处理;将Windows查看日志用户端口等命令集成在批处理脚本中。让熟练的应急人员能省去多次重复的敲击和记忆,并通过读取配置文件来调用Windows自带的命令结束进程服务等,本批处理尽量不调用任何外部的工具。任何调用的外部工具都将会存放在plugin目录下可按需使用,力图使用最原生的命令行来完成工作。 - GitHub - 0xbinibini/emergen...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Malicious document builder for CVE-2021-40444
URL:https://github.com/amartinsec/MSHTMHell
更新了:CVE-2021
描述:Malicious document builder for CVE-2021-40444
URL:https://github.com/amartinsec/MSHTMHell
GitHub
GitHub - amartinsec/MSHTMHell: Malicious document builder for CVE-2021-40444
Malicious document builder for CVE-2021-40444 . Contribute to amartinsec/MSHTMHell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
URL:https://github.com/BlackSnufkin/PT-ToolKit
更新了:Red Team
描述:Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
URL:https://github.com/BlackSnufkin/PT-ToolKit
GitHub
GitHub - BlackSnufkin/PT-ToolKit: Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement - GitHub - BlackSnufkin/PT-ToolKit: Exploits Scripts and other tools that are useful during Penet...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-3156: Sudo heap overflow exploit for Debian 10
URL:https://github.com/0xdevil/CVE-2021-3156
更新了:CVE-2021
描述:CVE-2021-3156: Sudo heap overflow exploit for Debian 10
URL:https://github.com/0xdevil/CVE-2021-3156
GitHub
GitHub - 0xdevil/CVE-2021-3156: CVE-2021-3156: Sudo heap overflow exploit for Debian 10
CVE-2021-3156: Sudo heap overflow exploit for Debian 10 - 0xdevil/CVE-2021-3156
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teamming together.
URL:https://github.com/knight0x07/ImpulsiveDLLHijack
更新了:Red Team
描述:Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teamming together.
URL:https://github.com/knight0x07/ImpulsiveDLLHijack
GitHub
GitHub - knight0x07/ImpulsiveDLLHijack: C# based tool which automates the process of discovering and exploiting DLL Hijacks in…
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Cybersecurity blog. Red Team, pentest, malware analysis and dev
URL:https://github.com/cocomelonc/cocomelonc.github.io
更新了:Red Team
描述:Cybersecurity blog. Red Team, pentest, malware analysis and dev
URL:https://github.com/cocomelonc/cocomelonc.github.io
GitHub
GitHub - cocomelonc/cocomelonc.github.io: Cybersecurity blog. Red Team, pentest, malware analysis and dev
Cybersecurity blog. Red Team, pentest, malware analysis and dev - cocomelonc/cocomelonc.github.io
GitHub监控消息提醒!!!
更新了:Red Team
描述:Cybersecurity blog. Red Team, pentest, malware analysis and dev
URL:https://github.com/Jeromeyoung/cocomelonc.github.io
更新了:Red Team
描述:Cybersecurity blog. Red Team, pentest, malware analysis and dev
URL:https://github.com/Jeromeyoung/cocomelonc.github.io
GitHub
GitHub - Jeromeyoung/cocomelonc.github.io: Cybersecurity blog. Red Team, pentest, malware analysis and dev
Cybersecurity blog. Red Team, pentest, malware analysis and dev - GitHub - Jeromeyoung/cocomelonc.github.io: Cybersecurity blog. Red Team, pentest, malware analysis and dev
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC for exploiting CVE-2021-1833 : This issue was addressed with improved checks. This issue is fixed in iOS 14.5 and iPadOS 14.5. An application may be able to gain elevated privileges.
URL:https://github.com/AlAIAL90/CVE-2021-1829
更新了:CVE-2021
描述:PoC for exploiting CVE-2021-1833 : This issue was addressed with improved checks. This issue is fixed in iOS 14.5 and iPadOS 14.5. An application may be able to gain elevated privileges.
URL:https://github.com/AlAIAL90/CVE-2021-1829
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
URL:https://github.com/aslitsecurity/CVE-2021-40444_builders
更新了:CVE-2021
描述:This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
URL:https://github.com/aslitsecurity/CVE-2021-40444_builders
GitHub
GitHub - aslitsecurity/CVE-2021-40444_builders: This repo contain builders of cab file, html file, and docx file for CVE-2021-40444…
This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit - aslitsecurity/CVE-2021-40444_builders
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-38647 POC for RCE
URL:https://github.com/midoxnet/CVE-2021-38647
更新了:CVE-2021
描述:CVE-2021-38647 POC for RCE
URL:https://github.com/midoxnet/CVE-2021-38647
GitHub
GitHub - midoxnet/CVE-2021-38647: CVE-2021-38647 POC for RCE
CVE-2021-38647 POC for RCE. Contribute to midoxnet/CVE-2021-38647 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-40444 - MS Office Word RCE Exploit
URL:https://github.com/klezVirus/CVE-2021-40444
更新了:CVE-2021
描述:CVE-2021-40444 - MS Office Word RCE Exploit
URL:https://github.com/klezVirus/CVE-2021-40444
GitHub
GitHub - klezVirus/CVE-2021-40444: CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit - klezVirus/CVE-2021-40444
GitHub监控消息提醒!!!
更新了:Red Team
描述:List of useful tools for the creation and administration of Red Team and Penetration Testing Infrastructure
URL:https://github.com/4chtung/RedSecOps
更新了:Red Team
描述:List of useful tools for the creation and administration of Red Team and Penetration Testing Infrastructure
URL:https://github.com/4chtung/RedSecOps
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-40444 - Custom CAB templates from MakeCAB
URL:https://github.com/Udyz/CVE-2021-40444-CAB
更新了:CVE-2021
描述:CVE-2021-40444 - Custom CAB templates from MakeCAB
URL:https://github.com/Udyz/CVE-2021-40444-CAB
GitHub
GitHub - Udyz/CVE-2021-40444-CAB: CVE-2021-40444 - Custom CAB templates from MakeCAB
CVE-2021-40444 - Custom CAB templates from MakeCAB - GitHub - Udyz/CVE-2021-40444-CAB: CVE-2021-40444 - Custom CAB templates from MakeCAB