GitHub监控消息提醒!!!
更新了:RCE
描述:Dynamically load Python modules from Github for RCE
URL:https://github.com/Nathi1235/Dynamic_Module_Loading
标签:#RCE
更新了:RCE
描述:Dynamically load Python modules from Github for RCE
URL:https://github.com/Nathi1235/Dynamic_Module_Loading
标签:#RCE
GitHub
GitHub - Nathi1235/Dynamic_Module_Loading: Dynamically load Python modules from Github for RCE
Dynamically load Python modules from Github for RCE - GitHub - Nathi1235/Dynamic_Module_Loading: Dynamically load Python modules from Github for RCE
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team tooling for cloud credentials gathering
URL:https://github.com/solidarity-labs/ignite
标签:#Red Team
更新了:Red Team
描述:Red Team tooling for cloud credentials gathering
URL:https://github.com/solidarity-labs/ignite
标签:#Red Team
GitHub
GitHub - solidarity-labs/ignite: Red Team tooling for cloud credentials gathering
Red Team tooling for cloud credentials gathering. Contribute to solidarity-labs/ignite development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:This Python implementation serves an educational purpose by demonstrating the exploitation of CVE-2023-23752. The code provides insight into the vulnerability's exploitation.
URL:https://github.com/Fernando-olv/Joomla-CVE-2023-23752
标签:#CVE-2023
更新了:CVE-2023
描述:This Python implementation serves an educational purpose by demonstrating the exploitation of CVE-2023-23752. The code provides insight into the vulnerability's exploitation.
URL:https://github.com/Fernando-olv/Joomla-CVE-2023-23752
标签:#CVE-2023
GitHub
GitHub - Fernando-olv/Joomla-CVE-2023-23752: This Python implementation serves an educational purpose by demonstrating the exploitation…
This Python implementation serves an educational purpose by demonstrating the exploitation of CVE-2023-23752. The code provides insight into the vulnerability's exploitation. - Fernando-olv...
GitHub监控消息提醒!!!
更新了:bypassav
描述:cs loader,bypassav, 分离免杀某60,某绒
URL:https://github.com/BKLockly/C_Loader
标签:#bypassav
更新了:bypassav
描述:cs loader,bypassav, 分离免杀某60,某绒
URL:https://github.com/BKLockly/C_Loader
标签:#bypassav
GitHub
GitHub - BKLockly/CLoader: cs loader,bypassav, 分离免杀某60,某绒
cs loader,bypassav, 分离免杀某60,某绒. Contribute to BKLockly/CLoader development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Example code demonstrating how LLMs could be Red Teamed.
URL:https://github.com/w8mej/TireFire
标签:#Red Team
更新了:Red Team
描述:Example code demonstrating how LLMs could be Red Teamed.
URL:https://github.com/w8mej/TireFire
标签:#Red Team
GitHub监控消息提醒!!!
更新了:攻防
描述:AWD 为线下赛事和Bugku的AWD所设计的比赛脚本框架,支持payloads自定义,一键获取flag,API自动提交 #攻防比赛 #AWD #脚本框架
URL:https://github.com/Gr-1m/AWD-Frame-ByGr1m
标签:#攻防
更新了:攻防
描述:AWD 为线下赛事和Bugku的AWD所设计的比赛脚本框架,支持payloads自定义,一键获取flag,API自动提交 #攻防比赛 #AWD #脚本框架
URL:https://github.com/Gr-1m/AWD-Frame-ByGr1m
标签:#攻防
GitHub
GitHub - Gr-1m/AWD-Frame-ByGr1m: AWD 为线下赛事和Bugku的AWD所设计的比赛脚本框架,支持payloads自定义,一键获取flag,API自动提交 #攻防比赛 #AWD #脚本框架
AWD 为线下赛事和Bugku的AWD所设计的比赛脚本框架,支持payloads自定义,一键获取flag,API自动提交 #攻防比赛 #AWD #脚本框架 - GitHub - Gr-1m/AWD-Frame-ByGr1m: AWD 为线下赛事和Bugku的AWD所设计的比赛脚本框架,支持payloads自定义,一键获取flag,API自动提交 #攻防比赛 #AWD #脚本框架
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Repository for archiving Cobalt Strike configuration
URL:https://github.com/BrownBearSec/cobalt-strike-logs
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Repository for archiving Cobalt Strike configuration
URL:https://github.com/BrownBearSec/cobalt-strike-logs
标签:#Cobalt Strike
GitHub
GitHub - BrownBearSec/cobalt-strike-logs: If a can find cobalt strike logs from threat actors, they're going here. This is intended…
If a can find cobalt strike logs from threat actors, they're going here. This is intended as a resource for security researchers. If there is a false positive here and you want me to take i...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Plugin to fix security vulnerability CVE-2023-40626 in Joomla 3.10.12
URL:https://github.com/TLWebdesign/Joomla-3.10.12-languagehelper-hotfix
标签:#CVE-2023
更新了:CVE-2023
描述:Plugin to fix security vulnerability CVE-2023-40626 in Joomla 3.10.12
URL:https://github.com/TLWebdesign/Joomla-3.10.12-languagehelper-hotfix
标签:#CVE-2023
GitHub
GitHub - TLWebdesign/Joomla-3.10.12-languagehelper-hotfix: Plugin to fix security vulnerability CVE-2023-40626 in Joomla 3.10.12
Plugin to fix security vulnerability CVE-2023-40626 in Joomla 3.10.12 - TLWebdesign/Joomla-3.10.12-languagehelper-hotfix
GitHub监控消息提醒!!!
更新了:RCE
描述:一款SSH批量改密,并持续监控的程序,可以实现改密时RCE,密码权限维持
URL:https://github.com/PlusTop/SSHsuoha
标签:#RCE
更新了:RCE
描述:一款SSH批量改密,并持续监控的程序,可以实现改密时RCE,密码权限维持
URL:https://github.com/PlusTop/SSHsuoha
标签:#RCE
GitHub
GitHub - s1kSec/SSHsuoha: 一款SSH批量改密,并持续监控的程序,可以实现改密时RCE,密码权限维持
一款SSH批量改密,并持续监控的程序,可以实现改密时RCE,密码权限维持. Contribute to s1kSec/SSHsuoha development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:某思智能物流无人值守系统文件上传 poc EXP 渗透测试
URL:https://github.com/FeiNiao/Unmanned-intelligent-logistics-system-file-upload
标签:#渗透测试
更新了:渗透测试
描述:某思智能物流无人值守系统文件上传 poc EXP 渗透测试
URL:https://github.com/FeiNiao/Unmanned-intelligent-logistics-system-file-upload
标签:#渗透测试
GitHub
GitHub - FeiNiao/Unmanned-intelligent-logistics-system-file-upload: 某思智能物流无人值守系统文件上传 poc EXP 渗透测试
某思智能物流无人值守系统文件上传 poc EXP 渗透测试. Contribute to FeiNiao/Unmanned-intelligent-logistics-system-file-upload development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:codec-orm = Serialize / Deserialize Uni-API to ORM handler! 统一的序列化和反序列化 ORM 处理. 兼容任意协议, 如 protobuf/json/avro/..
URL:https://github.com/SolarisNeko/codec-orm
标签:#反序列化
更新了:反序列化
描述:codec-orm = Serialize / Deserialize Uni-API to ORM handler! 统一的序列化和反序列化 ORM 处理. 兼容任意协议, 如 protobuf/json/avro/..
URL:https://github.com/SolarisNeko/codec-orm
标签:#反序列化
GitHub
GitHub - SolarisNeko/codec-orm: codec-orm = Serialize / Deserialize Uni-API to ORM handler! 统一的序列化和反序列化 ORM 处理. 兼容任意协议…
codec-orm = Serialize / Deserialize Uni-API to ORM handler! 统一的序列化和反序列化 ORM 处理. 兼容任意协议, 如 protobuf/json/avro/.. - GitHub - SolarisNeko/codec-orm: codec-orm = Serialize / Deseria...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Proof of concept developed for the CVE-2023-36664
URL:https://github.com/JeanChpt/CVE-2023-36664
标签:#CVE-2023
更新了:CVE-2023
描述:Proof of concept developed for the CVE-2023-36664
URL:https://github.com/JeanChpt/CVE-2023-36664
标签:#CVE-2023
GitHub
GitHub - jeanchpt/CVE-2023-36664: Proof of concept developed for the CVE-2023-36664
Proof of concept developed for the CVE-2023-36664. Contribute to jeanchpt/CVE-2023-36664 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Demonstration of CVE-2023-24034 authorization bypass in Spring Security
URL:https://github.com/hotblac/cve-2023-34034
标签:#CVE-2023
更新了:CVE-2023
描述:Demonstration of CVE-2023-24034 authorization bypass in Spring Security
URL:https://github.com/hotblac/cve-2023-34034
标签:#CVE-2023
GitHub
GitHub - hotblac/cve-2023-34034: Demonstration of CVE-2023-24034 authorization bypass in Spring Security
Demonstration of CVE-2023-24034 authorization bypass in Spring Security - GitHub - hotblac/cve-2023-34034: Demonstration of CVE-2023-24034 authorization bypass in Spring Security
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-49103 scanner for shodan.io downloaded json files
URL:https://github.com/MixColumns/CVE-2023-49103
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-49103 scanner for shodan.io downloaded json files
URL:https://github.com/MixColumns/CVE-2023-49103
标签:#CVE-2023