GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)
URL:https://github.com/jheeree/Simple-CVE-2021-41773-checker
更新了:CVE-2021
描述:Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)
URL:https://github.com/jheeree/Simple-CVE-2021-41773-checker
GitHub
GitHub - jheeree/Simple-CVE-2021-41773-checker: Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021…
Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache) - jheeree/Simple-CVE-2021-41773-checker
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)
URL:https://github.com/ColdFusionX/CVE-2021-26085
更新了:CVE-2021
描述:Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)
URL:https://github.com/ColdFusionX/CVE-2021-26085
GitHub
GitHub - ColdFusionX/CVE-2021-26085: Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE…
Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085) - ColdFusionX/CVE-2021-26085
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)
URL:https://github.com/ColdFusionX/CVE-2021-26086
更新了:CVE-2021
描述:Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)
URL:https://github.com/ColdFusionX/CVE-2021-26086
GitHub
GitHub - ColdFusionX/CVE-2021-26086: Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)
Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086) - ColdFusionX/CVE-2021-26086
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
URL:https://github.com/im-hanzou/apachrot
更新了:CVE-2021
描述:Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
URL:https://github.com/im-hanzou/apachrot
GitHub
GitHub - im-hanzou/apachrot: Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker - im-hanzou/apachrot
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)
URL:https://github.com/rjt-gupta/CVE-2021-29337
更新了:CVE-2021
描述:CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)
URL:https://github.com/rjt-gupta/CVE-2021-29337
GitHub
GitHub - rjt-gupta/CVE-2021-29337: CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)
CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center) - rjt-gupta/CVE-2021-29337
GitHub监控消息提醒!!!
更新了:Red Team
描述:Repository to assist in the automation of a Red Team Operations Infrastructure.
URL:https://github.com/0xArch3r/offsec-infrastructure
更新了:Red Team
描述:Repository to assist in the automation of a Red Team Operations Infrastructure.
URL:https://github.com/0xArch3r/offsec-infrastructure
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Web UI for creating C2 profiles for Cobalt Strike
URL:https://github.com/Cobalt-Strike/sleep_python_bridge
更新了:Cobalt Strike
描述:Web UI for creating C2 profiles for Cobalt Strike
URL:https://github.com/Cobalt-Strike/sleep_python_bridge
GitHub
GitHub - Cobalt-Strike/sleep_python_bridge: This project is 'bridge' between the sleep and python language. It allows the control…
This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client. ...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
URL:https://github.com/ZeusBox/CVE-2021-37980
更新了:CVE-2021
描述:PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
URL:https://github.com/ZeusBox/CVE-2021-37980
GitHub
GitHub - ZeusBox/CVE-2021-37980: PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only) - ZeusBox/CVE-2021-37980
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Testing CVE-2021-30858 Rev3
URL:https://github.com/KameleonReloaded/CVEREV3
更新了:CVE-2021
描述:Testing CVE-2021-30858 Rev3
URL:https://github.com/KameleonReloaded/CVEREV3
GitHub
GitHub - KameleonReloaded/CVEREV3: Testing CVE-2021-30858 Rev3
Testing CVE-2021-30858 Rev3. Contribute to KameleonReloaded/CVEREV3 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files.
URL:https://github.com/xenoscr/atomiccaldera
更新了:Red Team
描述:A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files.
URL:https://github.com/xenoscr/atomiccaldera
GitHub
GitHub - xenoscr/atomiccaldera: A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to…
A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files. - GitHub - xenoscr/atomiccaldera: A MITRE Caldera plugin w...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:My take on CVE-2021-30858 for ps4 8.xx
URL:https://github.com/PeterMxx/ps4_8.00_vuln_poc
更新了:CVE-2021
描述:My take on CVE-2021-30858 for ps4 8.xx
URL:https://github.com/PeterMxx/ps4_8.00_vuln_poc
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
URL:https://github.com/bhdresh/CVE-2021-33766
更新了:CVE-2021
描述:ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
URL:https://github.com/bhdresh/CVE-2021-33766
GitHub
GitHub - bhdresh/CVE-2021-33766: ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit - bhdresh/CVE-2021-33766
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type
URL:https://github.com/outflanknl/HelpColor
更新了:Cobalt Strike
描述:Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type
URL:https://github.com/outflanknl/HelpColor
GitHub
GitHub - outflanknl/HelpColor: Agressor script that lists available Cobalt Strike beacon commands and colors them based on their…
Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type - outflanknl/HelpColor
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team programming projects.
URL:https://github.com/ncerne00/Red-Team-Projects
更新了:Red Team
描述:Red Team programming projects.
URL:https://github.com/ncerne00/Red-Team-Projects
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A simple Python proof of concept for CVE-2021-38295.
URL:https://github.com/ProfessionallyEvil/CVE-2021-38295-PoC
更新了:CVE-2021
描述:A simple Python proof of concept for CVE-2021-38295.
URL:https://github.com/ProfessionallyEvil/CVE-2021-38295-PoC
GitHub
GitHub - ProfessionallyEvil/CVE-2021-38295-PoC: A simple Python proof of concept for CVE-2021-38295.
A simple Python proof of concept for CVE-2021-38295. - ProfessionallyEvil/CVE-2021-38295-PoC
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Docker container lab to play/learn with CVE-2021-42013
URL:https://github.com/twseptian/CVE-2021-42013-Lab
更新了:CVE-2021
描述:Docker container lab to play/learn with CVE-2021-42013
URL:https://github.com/twseptian/CVE-2021-42013-Lab
GitHub
GitHub - twseptian/cve-2021-42013-docker-lab: Docker container lab to play/learn with CVE-2021-42013
Docker container lab to play/learn with CVE-2021-42013 - GitHub - twseptian/cve-2021-42013-docker-lab: Docker container lab to play/learn with CVE-2021-42013
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/B-garces/Red-Team-VS-Blue-Team-Project
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/B-garces/Red-Team-VS-Blue-Team-Project
GitHub
GitHub - B-garces/Red-Team-VS-Blue-Team-Project: Acted as a red team to attack a vulnerable VM within my environment, ultimately…
Acted as a red team to attack a vulnerable VM within my environment, ultimately gaining root access to the machine. Acted as Blue Team to use Kibana to review logs taken during the attack implement...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519
URL:https://github.com/MrCl0wnLab/SimplesApachePathTraversal
更新了:CVE-2021
描述:Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519
URL:https://github.com/MrCl0wnLab/SimplesApachePathTraversal
GitHub
GitHub - MrCl0wnLab/SimplesApachePathTraversal: Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519
Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519 - MrCl0wnLab/SimplesApachePathTraversal
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)
URL:https://github.com/theLSA/apache-httpd-path-traversal-checker
更新了:CVE-2021
描述:apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)
URL:https://github.com/theLSA/apache-httpd-path-traversal-checker
GitHub
GitHub - theLSA/apache-httpd-path-traversal-checker: apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)
apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013) - theLSA/apache-httpd-path-traversal-checker