GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited
URL:https://github.com/twseptian/CVE-2021-41773
更新了:CVE-2021
描述:CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited
URL:https://github.com/twseptian/CVE-2021-41773
GitHub
GitHub - twseptian/cve-2021-41773: CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited - GitHub - twseptian/cve-2021-41773: CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49/2.4.50)
URL:https://github.com/Zeop-CyberSec/apache_normalize_path
更新了:CVE-2021
描述:Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49/2.4.50)
URL:https://github.com/Zeop-CyberSec/apache_normalize_path
GitHub
GitHub - Zeop-CyberSec/apache_normalize_path: Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE…
Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49/2.4.50) - Zeop-CyberSec/apache_normalize_path
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/megatop1/RedTeam
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/megatop1/RedTeam
GitHub
GitHub - megatop1/RedTeam: Red Team Toolkit for CTF's and Learning for Windows Offense
Red Team Toolkit for CTF's and Learning for Windows Offense - GitHub - megatop1/RedTeam: Red Team Toolkit for CTF's and Learning for Windows Offense
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:C-Ark Credential Decoder for #CVE-2021-31796
URL:https://github.com/unmanarc/CACredDecoder
更新了:CVE-2021
描述:C-Ark Credential Decoder for #CVE-2021-31796
URL:https://github.com/unmanarc/CACredDecoder
GitHub
GitHub - unmanarc/CACredDecoder: C-Ark Credential Decoder for #CVE-2021-31796
C-Ark Credential Decoder for #CVE-2021-31796. Contribute to unmanarc/CACredDecoder development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
URL:https://github.com/Sirius-RJ/FullstackAcademy-Printernightmare-writeup-2105-E.C.A.R.
更新了:CVE-2021
描述:This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
URL:https://github.com/Sirius-RJ/FullstackAcademy-Printernightmare-writeup-2105-E.C.A.R.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.
URL:https://github.com/bp2008/DahuaLoginBypass
更新了:CVE-2021
描述:Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.
URL:https://github.com/bp2008/DahuaLoginBypass
GitHub
GitHub - bp2008/DahuaLoginBypass: Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua…
Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication. - bp2008/DahuaLoginBypass
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)
URL:https://github.com/jheeree/Simple-CVE-2021-41773-checker
更新了:CVE-2021
描述:Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)
URL:https://github.com/jheeree/Simple-CVE-2021-41773-checker
GitHub
GitHub - jheeree/Simple-CVE-2021-41773-checker: Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021…
Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache) - jheeree/Simple-CVE-2021-41773-checker
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)
URL:https://github.com/ColdFusionX/CVE-2021-26085
更新了:CVE-2021
描述:Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)
URL:https://github.com/ColdFusionX/CVE-2021-26085
GitHub
GitHub - ColdFusionX/CVE-2021-26085: Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE…
Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085) - ColdFusionX/CVE-2021-26085
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)
URL:https://github.com/ColdFusionX/CVE-2021-26086
更新了:CVE-2021
描述:Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)
URL:https://github.com/ColdFusionX/CVE-2021-26086
GitHub
GitHub - ColdFusionX/CVE-2021-26086: Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)
Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086) - ColdFusionX/CVE-2021-26086
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
URL:https://github.com/im-hanzou/apachrot
更新了:CVE-2021
描述:Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
URL:https://github.com/im-hanzou/apachrot
GitHub
GitHub - im-hanzou/apachrot: Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker - im-hanzou/apachrot
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)
URL:https://github.com/rjt-gupta/CVE-2021-29337
更新了:CVE-2021
描述:CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)
URL:https://github.com/rjt-gupta/CVE-2021-29337
GitHub
GitHub - rjt-gupta/CVE-2021-29337: CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)
CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center) - rjt-gupta/CVE-2021-29337
GitHub监控消息提醒!!!
更新了:Red Team
描述:Repository to assist in the automation of a Red Team Operations Infrastructure.
URL:https://github.com/0xArch3r/offsec-infrastructure
更新了:Red Team
描述:Repository to assist in the automation of a Red Team Operations Infrastructure.
URL:https://github.com/0xArch3r/offsec-infrastructure
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Web UI for creating C2 profiles for Cobalt Strike
URL:https://github.com/Cobalt-Strike/sleep_python_bridge
更新了:Cobalt Strike
描述:Web UI for creating C2 profiles for Cobalt Strike
URL:https://github.com/Cobalt-Strike/sleep_python_bridge
GitHub
GitHub - Cobalt-Strike/sleep_python_bridge: This project is 'bridge' between the sleep and python language. It allows the control…
This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client. ...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
URL:https://github.com/ZeusBox/CVE-2021-37980
更新了:CVE-2021
描述:PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
URL:https://github.com/ZeusBox/CVE-2021-37980
GitHub
GitHub - ZeusBox/CVE-2021-37980: PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only) - ZeusBox/CVE-2021-37980
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Testing CVE-2021-30858 Rev3
URL:https://github.com/KameleonReloaded/CVEREV3
更新了:CVE-2021
描述:Testing CVE-2021-30858 Rev3
URL:https://github.com/KameleonReloaded/CVEREV3
GitHub
GitHub - KameleonReloaded/CVEREV3: Testing CVE-2021-30858 Rev3
Testing CVE-2021-30858 Rev3. Contribute to KameleonReloaded/CVEREV3 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files.
URL:https://github.com/xenoscr/atomiccaldera
更新了:Red Team
描述:A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files.
URL:https://github.com/xenoscr/atomiccaldera
GitHub
GitHub - xenoscr/atomiccaldera: A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to…
A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files. - GitHub - xenoscr/atomiccaldera: A MITRE Caldera plugin w...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:My take on CVE-2021-30858 for ps4 8.xx
URL:https://github.com/PeterMxx/ps4_8.00_vuln_poc
更新了:CVE-2021
描述:My take on CVE-2021-30858 for ps4 8.xx
URL:https://github.com/PeterMxx/ps4_8.00_vuln_poc