GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3
URL:https://github.com/Sp00p64/PyNightmare
更新了:CVE-2021
描述:PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3
URL:https://github.com/Sp00p64/PyNightmare
GitHub
GitHub - Sp00p64/PyNightmare: PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3
PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3 - GitHub - Sp00p64/PyNightmare: PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploit for nostromo <= 1.9.6. This exploit has the functionality of being able to have an interactive shell
URL:https://github.com/c0rnf13ld/nostromo-exploit-integrated-shell
更新了:Exploit
描述:Exploit for nostromo <= 1.9.6. This exploit has the functionality of being able to have an interactive shell
URL:https://github.com/c0rnf13ld/nostromo-exploit-integrated-shell
GitHub
GitHub - c0rnf13ld/nostromo-exploit-integrated-shell: Exploit for nostromo <= 1.9.6. This exploit has the functionality of being…
Exploit for nostromo <= 1.9.6. This exploit has the functionality of being able to have an interactive shell - GitHub - c0rnf13ld/nostromo-exploit-integrated-shell: Exploit for nostromo &...
GitHub监控消息提醒!!!
更新了:Exploit
描述:PDF Exploit Builder, bin EXE to PDF
URL:https://github.com/anonymonline2020/PDF-EXPLOIT-BUILDER
更新了:Exploit
描述:PDF Exploit Builder, bin EXE to PDF
URL:https://github.com/anonymonline2020/PDF-EXPLOIT-BUILDER
GitHub
GitHub - anonymonline2020/PDF-EXPLOIT-BUILDER: PDF Exploit Builder, bin EXE to PDF
PDF Exploit Builder, bin EXE to PDF. Contribute to anonymonline2020/PDF-EXPLOIT-BUILDER development by creating an account on GitHub.
实用软件分享: @syrjfx_sl
你就是馋她的身子: @meinvfan
Github红队资源监控:@GithubRedTeam
部分需要解压密码,进群咨询管理
https://t.me/joinchat/Sey6XNFWuGT7pxbD
你就是馋她的身子: @meinvfan
Github红队资源监控:@GithubRedTeam
部分需要解压密码,进群咨询管理
https://t.me/joinchat/Sey6XNFWuGT7pxbD
Telegram
🌈盘丝洞✨ 备用群
You’ve been invited to join this group on Telegram.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Tactics and Techniques
URL:https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
更新了:Red Team
描述:Red Teaming Tactics and Techniques
URL:https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
GitHub
GitHub - mantvydasb/RedTeaming-Tactics-and-Techniques: Red Teaming Tactics and Techniques
Red Teaming Tactics and Techniques. Contribute to mantvydasb/RedTeaming-Tactics-and-Techniques development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Exploit
描述:CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin.
URL:https://github.com/wolf0x/HiveNightmare
更新了:Exploit
描述:CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin.
URL:https://github.com/wolf0x/HiveNightmare
GitHub
GitHub - wolf0x/HiveNightmare: CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin.
CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin. - wolf0x/HiveNightmare
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploits that I modified according to my need/usecase .
URL:https://github.com/A3h1nt/Exploits
更新了:Exploit
描述:Exploits that I modified according to my need/usecase .
URL:https://github.com/A3h1nt/Exploits
GitHub
GitHub - A3h1nt/Exploits: Exploits that I modified according to my need/usecase .
Exploits that I modified according to my need/usecase . - GitHub - A3h1nt/Exploits: Exploits that I modified according to my need/usecase .
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:C# PoC for CVE-2021-36934/HiveNightmare/SeriousSAM
URL:https://github.com/cube0x0/CVE-2021-36934
更新了:CVE-2021
描述:C# PoC for CVE-2021-36934/HiveNightmare/SeriousSAM
URL:https://github.com/cube0x0/CVE-2021-36934
GitHub监控消息提醒!!!
更新了:Exploit
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/HuskyHacks/ShadowSteal
更新了:Exploit
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/HuskyHacks/ShadowSteal
GitHub
GitHub - HuskyHacks/ShadowSteal: Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation - HuskyHacks/ShadowSteal
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploits project Hacking Command Center
URL:https://github.com/chacka0101/exploits
更新了:Exploit
描述:Exploits project Hacking Command Center
URL:https://github.com/chacka0101/exploits
GitHub
GitHub - chacka0101/exploits: Exploits project Hacking Command Center
Exploits project Hacking Command Center. Contribute to chacka0101/exploits development by creating an account on GitHub.