GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability
URL:https://github.com/zam89/CVE-2024-3400-pot
标签:#CVE-2024
更新了:CVE-2024
描述:Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability
URL:https://github.com/zam89/CVE-2024-3400-pot
标签:#CVE-2024
GitHub
GitHub - zam89/CVE-2024-3400-pot: Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability
Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability - zam89/CVE-2024-3400-pot
GitHub监控消息提醒!!!
更新了:Red Team
描述:Just a little k8s lab in hyper-v for Red Team or Pentesting practise
URL:https://github.com/anthares101/the3musketeers-k8s-lab-hyperv
标签:#Red Team
更新了:Red Team
描述:Just a little k8s lab in hyper-v for Red Team or Pentesting practise
URL:https://github.com/anthares101/the3musketeers-k8s-lab-hyperv
标签:#Red Team
GitHub
GitHub - anthares101/the3musketeers-k8s-lab-hyperv: Just a little k8s lab in hyper-v for Red Team or Pentesting practise
Just a little k8s lab in hyper-v for Red Team or Pentesting practise - anthares101/the3musketeers-k8s-lab-hyperv
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CubeCart <= 6.5.4 is vulnerable to an arbitrary file upload that leads to remote code execution (RCE).
URL:https://github.com/julio-cfa/CVE-2024-33438
标签:#CVE-2024
更新了:CVE-2024
描述:CubeCart <= 6.5.4 is vulnerable to an arbitrary file upload that leads to remote code execution (RCE).
URL:https://github.com/julio-cfa/CVE-2024-33438
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE)
URL:https://github.com/Zyad-Elsayed/CVE-2023-42793
标签:#RCE
更新了:RCE
描述:JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE)
URL:https://github.com/Zyad-Elsayed/CVE-2023-42793
标签:#RCE
GitHub
GitHub - Zyad-Elsayed/CVE-2023-42793: JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE), CVE-2023-42793
JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE), CVE-2023-42793 - Zyad-Elsayed/CVE-2023-42793
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Blind SQLi exploit for CVE-2024-2876. a vulnerability effecting the Icegram express - Email subscribers plugin for wordpress.
URL:https://github.com/c0d3zilla/CVE-2024-2876
标签:#CVE-2024
更新了:CVE-2024
描述:Blind SQLi exploit for CVE-2024-2876. a vulnerability effecting the Icegram express - Email subscribers plugin for wordpress.
URL:https://github.com/c0d3zilla/CVE-2024-2876
标签:#CVE-2024
GitHub
GitHub - c0d3zilla/CVE-2024-2876: POC for SQLi vulnerability in Icegram express
POC for SQLi vulnerability in Icegram express . Contribute to c0d3zilla/CVE-2024-2876 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.
URL:https://github.com/W01fh4cker/CVE-2023-20198-RCE
标签:#RCE
更新了:RCE
描述:CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.
URL:https://github.com/W01fh4cker/CVE-2023-20198-RCE
标签:#RCE
GitHub
GitHub - W01fh4cker/CVE-2023-20198-RCE: CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.
CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands. - W01fh4cker/CVE-2023-20198-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:rpc.py 0.6.0 - Remote Code Execution (RCE)
URL:https://github.com/fuzzlove/CVE-2022-35411
标签:#RCE
更新了:RCE
描述:rpc.py 0.6.0 - Remote Code Execution (RCE)
URL:https://github.com/fuzzlove/CVE-2022-35411
标签:#RCE
GitHub
GitHub - fuzzlove/CVE-2022-35411: rpc.py 0.6.0 - Remote Code Execution (RCE)
rpc.py 0.6.0 - Remote Code Execution (RCE). Contribute to fuzzlove/CVE-2022-35411 development by creating an account on GitHub.
👎1
GitHub监控消息提醒!!!
更新了:sql注入
描述:大一期末作业,php写的简易图书管理系统,很多地方没有防止sql注入
URL:https://github.com/VXTWHHH/-demo_PHP
标签:#sql注入
更新了:sql注入
描述:大一期末作业,php写的简易图书管理系统,很多地方没有防止sql注入
URL:https://github.com/VXTWHHH/-demo_PHP
标签:#sql注入
GitHub
GitHub - VXTWHHH/bookManager-demo_PHP: 大一期末作业,php写的简易图书管理系统,很多地方没有防止sql注入
大一期末作业,php写的简易图书管理系统,很多地方没有防止sql注入. Contribute to VXTWHHH/bookManager-demo_PHP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:大一期末作业,php写的简易图书管理系统,很多地方没有防止sql注入
URL:https://github.com/VXTWHHH/bookManager-demo_PHP
标签:#sql注入
更新了:sql注入
描述:大一期末作业,php写的简易图书管理系统,很多地方没有防止sql注入
URL:https://github.com/VXTWHHH/bookManager-demo_PHP
标签:#sql注入
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover
URL:https://github.com/Stuub/Crushed-CVE-2024-4040-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover
URL:https://github.com/Stuub/Crushed-CVE-2024-4040-PoC
标签:#CVE-2024
GitHub
GitHub - Stuub/CVE-2024-4040-SSTI-LFI-PoC: CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support
CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support - Stuub/CVE-2024-4040-SSTI-LFI-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover
URL:https://github.com/Stuub/CVE-2024-4040-SSTI-LFI
标签:#RCE
更新了:RCE
描述:CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover
URL:https://github.com/Stuub/CVE-2024-4040-SSTI-LFI
标签:#RCE
GitHub
GitHub - Stuub/CVE-2024-4040-SSTI-LFI-PoC: CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support
CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support - Stuub/CVE-2024-4040-SSTI-LFI-PoC
GitHub监控消息提醒!!!
更新了:Red Team
描述:Capstone project for Red Team at Bellevue University, March 2024.
URL:https://github.com/CoderT-Rex/Moffat-Bay
标签:#Red Team
更新了:Red Team
描述:Capstone project for Red Team at Bellevue University, March 2024.
URL:https://github.com/CoderT-Rex/Moffat-Bay
标签:#Red Team
GitHub
GitHub - CoderT-Rex/Moffat-Bay: Capstone project for Red Team at Bellevue University, March 2024.
Capstone project for Red Team at Bellevue University, March 2024. - GitHub - CoderT-Rex/Moffat-Bay: Capstone project for Red Team at Bellevue University, March 2024.
GitHub监控消息提醒!!!
更新了:代码注入
描述:借助adb协议+jwdp协议在Android端实现基于debugger的代码注入工具
URL:https://github.com/wuyr/jdwp-injector-for-android
标签:#代码注入
更新了:代码注入
描述:借助adb协议+jwdp协议在Android端实现基于debugger的代码注入工具
URL:https://github.com/wuyr/jdwp-injector-for-android
标签:#代码注入
GitHub
GitHub - wuyr/jdwp-injector-for-android: 借助adb协议+jdwp协议在Android端实现基于debugger的代码注入工具
借助adb协议+jdwp协议在Android端实现基于debugger的代码注入工具. Contribute to wuyr/jdwp-injector-for-android development by creating an account on GitHub.