GitHub监控消息提醒!!!
更新了:Red Team
描述:Here you can find my curated list for AD Penetration tests and Red Team Techniques
URL:https://github.com/hisanmehmood/Awesome-AD-Pentest
更新了:Red Team
描述:Here you can find my curated list for AD Penetration tests and Red Team Techniques
URL:https://github.com/hisanmehmood/Awesome-AD-Pentest
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-40875: Tools to Inspect Gurock Testrail Servers for Vulnerabilities related to CVE-2021-40875.
URL:https://github.com/SakuraSamuraii/derailed
更新了:CVE-2021
描述:CVE-2021-40875: Tools to Inspect Gurock Testrail Servers for Vulnerabilities related to CVE-2021-40875.
URL:https://github.com/SakuraSamuraii/derailed
GitHub
GitHub - SakuraSamuraii/derailed: CVE-2021-40875: Tools to Inspect Gurock Testrail Servers for Vulnerabilities related to CVE-2021…
CVE-2021-40875: Tools to Inspect Gurock Testrail Servers for Vulnerabilities related to CVE-2021-40875. - GitHub - SakuraSamuraii/derailed: CVE-2021-40875: Tools to Inspect Gurock Testrail Servers ...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyShell] CVE-2021-31195 & CVE-2021-31196 Exploit Chains
URL:https://github.com/hosch3n/ProxyVulns
更新了:CVE-2021
描述:[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyShell] CVE-2021-31195 & CVE-2021-31196 Exploit Chains
URL:https://github.com/hosch3n/ProxyVulns
GitHub
GitHub - hosch3n/ProxyVulns: [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021…
[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the \"OMIGOD\" vulnerabilities discovered by Wiz's threat research team, specifically CVE-2021-38647.
URL:https://github.com/marcosimioni/omigood
更新了:CVE-2021
描述:OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the \"OMIGOD\" vulnerabilities discovered by Wiz's threat research team, specifically CVE-2021-38647.
URL:https://github.com/marcosimioni/omigood
GitHub
GitHub - marcosimioni/omigood: OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities…
OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research team, specifically CVE-2021-38647. - ...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.
URL:https://github.com/outflanknl/WdToggle
更新了:Cobalt Strike
描述:A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.
URL:https://github.com/outflanknl/WdToggle
GitHub
GitHub - outflanknl/WdToggle: A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential…
A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching. - GitHub - outflanknl/WdToggle: A Beacon Object File (BOF) for Cobalt Strike which ...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or process handles.
URL:https://github.com/outflanknl/FindObjects-BOF
更新了:Cobalt Strike
描述:A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or process handles.
URL:https://github.com/outflanknl/FindObjects-BOF
GitHub
GitHub - outflanknl/FindObjects-BOF: A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate…
A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or process handles. - GitHub - outflanknl/FindObjects-BOF: A Cobal...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:https://github.com/corelight/CVE-2021-38647 without the bloat
URL:https://github.com/abousteif/cve-2021-38647
更新了:CVE-2021
描述:https://github.com/corelight/CVE-2021-38647 without the bloat
URL:https://github.com/abousteif/cve-2021-38647
GitHub
GitHub - corelight/CVE-2021-38647: CVE-2021-38647 AKA "OMIGOD" vulnerability in Windows OMI
CVE-2021-38647 AKA "OMIGOD" vulnerability in Windows OMI - corelight/CVE-2021-38647
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Collection of resources related to Cobalt Strike investigations
URL:https://github.com/invictus-ir/cobaltstrike
更新了:Cobalt Strike
描述:Collection of resources related to Cobalt Strike investigations
URL:https://github.com/invictus-ir/cobaltstrike
GitHub
GitHub - invictus-ir/cobaltstrike: Collection of resources related to Cobalt Strike investigations
Collection of resources related to Cobalt Strike investigations - GitHub - invictus-ir/cobaltstrike: Collection of resources related to Cobalt Strike investigations
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.
URL:https://github.com/shabarkin/pointer
更新了:Cobalt Strike
描述:Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.
URL:https://github.com/shabarkin/pointer
GitHub
GitHub - shabarkin/pointer: Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.
Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet. - GitHub - shabarkin/pointer: Pointer was developed for massive hunting and mapping Cobalt Strik...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-33739 PoC Analysis
URL:https://github.com/giwon9977/CVE-2021-33739_PoC
更新了:CVE-2021
描述:CVE-2021-33739 PoC Analysis
URL:https://github.com/giwon9977/CVE-2021-33739_PoC
GitHub
GitHub - giwon9977/CVE-2021-33739_PoC_Analysis: CVE-2021-33739 PoC Analysis
CVE-2021-33739 PoC Analysis. Contribute to giwon9977/CVE-2021-33739_PoC_Analysis development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Implement load Cobalt Strike & Metasploit shellcode with golang
URL:https://github.com/An0ny-m0us/DesertFox
更新了:Cobalt Strike
描述:Implement load Cobalt Strike & Metasploit shellcode with golang
URL:https://github.com/An0ny-m0us/DesertFox
GitHub
GitHub - zha0gongz1/DesertFox: Implement load Cobalt Strike & Metasploit shellcode with golang
Implement load Cobalt Strike & Metasploit shellcode with golang - GitHub - zha0gongz1/DesertFox: Implement load Cobalt Strike & Metasploit shellcode with golang
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as root.
URL:https://github.com/Vulnmachines/OMIGOD_cve-2021-38647
更新了:CVE-2021
描述:CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as root.
URL:https://github.com/Vulnmachines/OMIGOD_cve-2021-38647
GitHub
GitHub - Vulnmachines/OMIGOD_cve-2021-38647: CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as…
CVE-2021-38647 is an unauthenticated RCE vulnerability effecting the OMI agent as root. - Vulnmachines/OMIGOD_cve-2021-38647
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Implement load Cobalt Strike & Metasploit shellcode with golang
URL:https://github.com/zha0gongz1/DesertFox
更新了:Cobalt Strike
描述:Implement load Cobalt Strike & Metasploit shellcode with golang
URL:https://github.com/zha0gongz1/DesertFox
GitHub
GitHub - zha0gongz1/DesertFox: Implement load Cobalt Strike & Metasploit&Sliver shellcode with golang
Implement load Cobalt Strike & Metasploit&Sliver shellcode with golang - zha0gongz1/DesertFox
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Tactics and Techniques
URL:https://github.com/mantvydasb/RedTeaming-Tactics-and-Techniques
更新了:Red Team
描述:Red Teaming Tactics and Techniques
URL:https://github.com/mantvydasb/RedTeaming-Tactics-and-Techniques
GitHub
GitHub - mantvydasb/RedTeaming-Tactics-and-Techniques: Red Teaming Tactics and Techniques
Red Teaming Tactics and Techniques. Contribute to mantvydasb/RedTeaming-Tactics-and-Techniques development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Tactics and Techniques
URL:https://github.com/toddrob99/redball
更新了:Red Team
描述:Red Teaming Tactics and Techniques
URL:https://github.com/toddrob99/redball
GitHub
GitHub - toddrob99/redball: The redball bot management platform facilitates creating, configuring, and running of bots using a…
The redball bot management platform facilitates creating, configuring, and running of bots using a web interface. Includes bots to post and update discussion threads on Reddit related to MLB and NF...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-22005批量验证python脚本
URL:https://github.com/5gstudent/CVE-2021-22005-
更新了:CVE-2021
描述:CVE-2021-22005批量验证python脚本
URL:https://github.com/5gstudent/CVE-2021-22005-
GitHub
GitHub - 5gstudent/CVE-2021-22005-: CVE-2021-22005批量验证python脚本
CVE-2021-22005批量验证python脚本. Contribute to 5gstudent/CVE-2021-22005- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红队
描述:F-vuln(全称:Find-Vulnerability)是为了自己工作方便专门编写的一款自动化工具,主要适用于日常安全服务、渗透测试人员和RedTeam红队人员,它集合的功能包括:存活IP探测、开放端口探测、web服务探测、web漏洞扫描、smb爆破、ssh爆破、ftp爆破、mssql爆破等其他数据库爆破工作以及大量web漏洞检测模块。
URL:https://github.com/d3ckx1/Fvuln
更新了:红队
描述:F-vuln(全称:Find-Vulnerability)是为了自己工作方便专门编写的一款自动化工具,主要适用于日常安全服务、渗透测试人员和RedTeam红队人员,它集合的功能包括:存活IP探测、开放端口探测、web服务探测、web漏洞扫描、smb爆破、ssh爆破、ftp爆破、mssql爆破等其他数据库爆破工作以及大量web漏洞检测模块。
URL:https://github.com/d3ckx1/Fvuln
GitHub
GitHub - d3ckx1/Fvuln: F-vuln(全称:Find-Vulnerability)是为了自己工作方便专门编写的一款自动化工具,主要适用于日常安全服务、渗透测试人员和RedTeam红队人员,它集合的功能包括:存活IP探测、开放端口探…
F-vuln(全称:Find-Vulnerability)是为了自己工作方便专门编写的一款自动化工具,主要适用于日常安全服务、渗透测试人员和RedTeam红队人员,它集合的功能包括:存活IP探测、开放端口探测、web服务探测、web漏洞扫描、smb爆破、ssh爆破、ftp爆破、mssql爆破等其他数据库爆破工作以及大量web漏洞检测模块。 - d3ckx1/Fvuln
👍1