GitHub监控消息提醒!!!
更新了:webshell
描述:A simple python webshell that instanciates a python webserver that you can execute shell commands on
URL:https://github.com/Franco-Mezzarapa/python-webshell
标签:#webshell
更新了:webshell
描述:A simple python webshell that instanciates a python webserver that you can execute shell commands on
URL:https://github.com/Franco-Mezzarapa/python-webshell
标签:#webshell
GitHub
GitHub - Franco-Mezzarapa/python-webshell: A simple python webshell that instanciates a python webserver that you can execute shell…
A simple python webshell that instanciates a python webserver that you can execute shell commands on - Franco-Mezzarapa/python-webshell
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/kerberoshacker/CVE-2024-3400-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/kerberoshacker/CVE-2024-3400-POC
标签:#CVE-2024
👎1
GitHub监控消息提醒!!!
更新了:Red Team
描述:My Red Team Notes
URL:https://github.com/ninjaa-exe/Red-Team-Notes
标签:#Red Team
更新了:Red Team
描述:My Red Team Notes
URL:https://github.com/ninjaa-exe/Red-Team-Notes
标签:#Red Team
GitHub
GitHub - ninjaa-exe/Red-Team-Notes: My Red Team Notes
My Red Team Notes. Contribute to ninjaa-exe/Red-Team-Notes development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A simple bash script to check for evidence of compromise related to CVE-2024-3400
URL:https://github.com/MurrayR0123/CVE-2024-3400_compromise_checker
标签:#CVE-2024
更新了:CVE-2024
描述:A simple bash script to check for evidence of compromise related to CVE-2024-3400
URL:https://github.com/MurrayR0123/CVE-2024-3400_compromise_checker
标签:#CVE-2024
GitHub
GitHub - MurrayR0123/CVE-2024-3400-Compromise-Checker: A simple bash script to check for evidence of compromise related to CVE…
A simple bash script to check for evidence of compromise related to CVE-2024-3400 - MurrayR0123/CVE-2024-3400-Compromise-Checker
GitHub监控消息提醒!!!
更新了:sql注入
描述:MyBatis sql注入、多租户、逻辑删除、数据权限插件-SqlHelper
URL:https://github.com/heykb/mybatis-sqlhelper
标签:#sql注入
更新了:sql注入
描述:MyBatis sql注入、多租户、逻辑删除、数据权限插件-SqlHelper
URL:https://github.com/heykb/mybatis-sqlhelper
标签:#sql注入
GitHub
GitHub - heykb/mybatis-sqlhelper: MyBatis sql注入、多租户、逻辑删除、数据权限插件-SqlHelper
MyBatis sql注入、多租户、逻辑删除、数据权限插件-SqlHelper. Contribute to heykb/mybatis-sqlhelper development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A simple bash script to check for evidence of compromise related to CVE-2024-3400
URL:https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker
标签:#CVE-2024
更新了:CVE-2024
描述:A simple bash script to check for evidence of compromise related to CVE-2024-3400
URL:https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker
标签:#CVE-2024
GitHub
GitHub - MurrayR0123/CVE-2024-3400-Compromise-Checker: A simple bash script to check for evidence of compromise related to CVE…
A simple bash script to check for evidence of compromise related to CVE-2024-3400 - MurrayR0123/CVE-2024-3400-Compromise-Checker
GitHub监控消息提醒!!!
更新了:代码审计
描述:miniprogram track 是用于小程序安全审计的工具包(反编译、调试、代码审计)
URL:https://github.com/AEPKILL/miniprogram-track
标签:#代码审计
更新了:代码审计
描述:miniprogram track 是用于小程序安全审计的工具包(反编译、调试、代码审计)
URL:https://github.com/AEPKILL/miniprogram-track
标签:#代码审计
GitHub
GitHub - AEPKILL/miniprogram-track: miniprogram track 是用于小程序安全审计的工具包(反编译、调试、代码审计)
miniprogram track 是用于小程序安全审计的工具包(反编译、调试、代码审计). Contribute to AEPKILL/miniprogram-track development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/battleoverflow/apache-traversal
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/battleoverflow/apache-traversal
标签:#RCE
GitHub
GitHub - battleoverflow/apache-traversal: This exploit is based on a few CVE vulnerabilities affecting Apache 2.4.49. We use URL…
This exploit is based on a few CVE vulnerabilities affecting Apache 2.4.49. We use URL-encoded characters to access certain files or otherwise restricted resources on the server. Possible RCE on ce...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-31734
URL:https://github.com/HBLocker/CVE-2024-31734
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-31734
URL:https://github.com/HBLocker/CVE-2024-31734
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:免杀
描述:GoBypassAV是一款用Go语言编写的免杀工具,支持自动化随机加解密,食用方便,简单易上手。
URL:https://github.com/A-little-dragon/GoBypassAV
标签:#免杀
更新了:免杀
描述:GoBypassAV是一款用Go语言编写的免杀工具,支持自动化随机加解密,食用方便,简单易上手。
URL:https://github.com/A-little-dragon/GoBypassAV
标签:#免杀
GitHub
GitHub - A-little-dragon/GoBypassAV: GoBypassAV是一款用Go语言编写的免杀工具,支持自动化随机加解密,食用方便,简单易上手。
GoBypassAV是一款用Go语言编写的免杀工具,支持自动化随机加解密,食用方便,简单易上手。. Contribute to A-little-dragon/GoBypassAV development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/kerberoshacker2/CVE-2024-3400-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/kerberoshacker2/CVE-2024-3400-POC
标签:#CVE-2024
👎1
GitHub监控消息提醒!!!
更新了:Red Team
描述:基于 chatgpt-web 兼容 LLM Red Team 项目下所有的 free-api 以及 one-api 或者 new-api提供的接口和 key
URL:https://github.com/SuYxh/chatgpt-web-llm-red-team
标签:#Red Team
更新了:Red Team
描述:基于 chatgpt-web 兼容 LLM Red Team 项目下所有的 free-api 以及 one-api 或者 new-api提供的接口和 key
URL:https://github.com/SuYxh/chatgpt-web-llm-red-team
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/Symbolexe/CVE-2024-1642470
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/Symbolexe/CVE-2024-1642470
标签:#CVE-2024
GitHub
GitHub - Symbolexe/CVE-2024-1642470: CVE-2024-1642470 is a critical vulnerability discovered in the Windows USB Generic Parent…
CVE-2024-1642470 is a critical vulnerability discovered in the Windows USB Generic Parent Driver. The vulnerability arises due to improper input validation within the driver's IOCTL handlin...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect
URL:https://github.com/AdaniKamal/CVE-2024-3400
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect
URL:https://github.com/AdaniKamal/CVE-2024-3400
标签:#CVE-2024
GitHub
GitHub - AdaniKamal/CVE-2024-3400: CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect
CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect - AdaniKamal/CVE-2024-3400
GitHub监控消息提醒!!!
更新了:webshell
描述:哥斯拉webshell管理工具的插件,用于连接websocket型webshell
URL:https://github.com/xsshim/GzWebsocket
标签:#webshell
更新了:webshell
描述:哥斯拉webshell管理工具的插件,用于连接websocket型webshell
URL:https://github.com/xsshim/GzWebsocket
标签:#webshell
GitHub
GitHub - xsshim/GzWebsocket: 哥斯拉webshell管理工具的插件,用于连接websocket型webshell
哥斯拉webshell管理工具的插件,用于连接websocket型webshell. Contribute to xsshim/GzWebsocket development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Issabel PBX 4.0.0 Remote Code Execution (Authenticated) - CVE-2024-0986
URL:https://github.com/gunzf0x/Issabel-PBX-4.0.0-RCE-Authenticated
标签:#CVE-2024
更新了:CVE-2024
描述:Issabel PBX 4.0.0 Remote Code Execution (Authenticated) - CVE-2024-0986
URL:https://github.com/gunzf0x/Issabel-PBX-4.0.0-RCE-Authenticated
标签:#CVE-2024
GitHub
GitHub - gunzf0x/Issabel-PBX-4.0.0-RCE-Authenticated: Issabel PBX 4.0.0 Remote Code Execution (Authenticated) - CVE-2024-0986
Issabel PBX 4.0.0 Remote Code Execution (Authenticated) - CVE-2024-0986 - gunzf0x/Issabel-PBX-4.0.0-RCE-Authenticated
GitHub监控消息提醒!!!
更新了:信息收集
描述:安全工具收集,包括各个阶段,信息收集到后渗透
URL:https://github.com/hxysaury/Use-of-network-security-tools
标签:#信息收集
更新了:信息收集
描述:安全工具收集,包括各个阶段,信息收集到后渗透
URL:https://github.com/hxysaury/Use-of-network-security-tools
标签:#信息收集
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 Palo Alto OS Command Injection
URL:https://github.com/h4x0r-dz/CVE-2024-3400
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 Palo Alto OS Command Injection
URL:https://github.com/h4x0r-dz/CVE-2024-3400
标签:#CVE-2024
GitHub
GitHub - h4x0r-dz/CVE-2024-3400: CVE-2024-3400 Palo Alto OS Command Injection
CVE-2024-3400 Palo Alto OS Command Injection. Contribute to h4x0r-dz/CVE-2024-3400 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Bsides Puerto Rico Red Team vs Med Team
URL:https://github.com/v3gahax/BSidesPR_Course
标签:#Red Team
更新了:Red Team
描述:Bsides Puerto Rico Red Team vs Med Team
URL:https://github.com/v3gahax/BSidesPR_Course
标签:#Red Team
GitHub
GitHub - v3gahax/BSidesPR_Course: Bsides Puerto Rico Red Team vs Med Team
Bsides Puerto Rico Red Team vs Med Team. Contribute to v3gahax/BSidesPR_Course development by creating an account on GitHub.