GitHub监控消息提醒!!!
更新了:渗透测试
描述:BurpSuite插件和渗透测试脚本汇总
URL:https://github.com/huan-cdm/secure_tools_link
标签:#渗透测试
更新了:渗透测试
描述:BurpSuite插件和渗透测试脚本汇总
URL:https://github.com/huan-cdm/secure_tools_link
标签:#渗透测试
GitHub
GitHub - huan-cdm/secure_tools_link: 网络安全相关工具和文章链接总结
网络安全相关工具和文章链接总结. Contribute to huan-cdm/secure_tools_link development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This is an exploit code for Activity monitor plugin in wordpress to obtain RCE(DC-6)
URL:https://github.com/bhanugoudm041/plainviewactivity-monitor-exploit
标签:#RCE
更新了:RCE
描述:This is an exploit code for Activity monitor plugin in wordpress to obtain RCE(DC-6)
URL:https://github.com/bhanugoudm041/plainviewactivity-monitor-exploit
标签:#RCE
GitHub
GitHub - bhanugoudm041/plainviewactivity-monitor-exploit: This is an exploit code for Activity monitor plugin in wordpress to obtain…
This is an exploit code for Activity monitor plugin in wordpress to obtain RCE(DC-6) - bhanugoudm041/plainviewactivity-monitor-exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:writeup and PoC for CVE-2024-32766 (QNAP) OS command injection and auth bypass
URL:https://github.com/3W1nd4r/CVE-2024-32766-RCE
标签:#RCE
更新了:RCE
描述:writeup and PoC for CVE-2024-32766 (QNAP) OS command injection and auth bypass
URL:https://github.com/3W1nd4r/CVE-2024-32766-RCE
标签:#RCE
GitHub
GitHub - 3W1nd4r/CVE-2024-32766-RCE: writeup and PoC for CVE-2024-32766 (QNAP) OS command injection and auth bypass
writeup and PoC for CVE-2024-32766 (QNAP) OS command injection and auth bypass - 3W1nd4r/CVE-2024-32766-RCE
👎2
GitHub监控消息提醒!!!
更新了:漏洞POC
描述:Fiora:漏洞PoC框架Nuclei的图形版。快捷搜索PoC、一键运行Nuclei。即可作为独立程序运行,也可作为burp插件使用。
URL:https://github.com/bit4woo/Fiora
标签:#漏洞POC
更新了:漏洞POC
描述:Fiora:漏洞PoC框架Nuclei的图形版。快捷搜索PoC、一键运行Nuclei。即可作为独立程序运行,也可作为burp插件使用。
URL:https://github.com/bit4woo/Fiora
标签:#漏洞POC
GitHub
GitHub - bit4woo/Fiora: Fiora:漏洞PoC框架Nuclei的图形版。快捷搜索PoC、一键运行Nuclei。即可作为独立程序运行,也可作为burp插件使用。
Fiora:漏洞PoC框架Nuclei的图形版。快捷搜索PoC、一键运行Nuclei。即可作为独立程序运行,也可作为burp插件使用。 - bit4woo/Fiora
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:自动化漏洞扫描系统,包括IP基础信息探测模块(位置、属性、操作系统、端口、绑定的域名、公司名称、公司位置信息、网站标题、CDN信息、绑定网站指纹、子域名),漏洞扫描模块,(weblogic、struts2、nuclei、xray、rad、目录扫描、js链接扫描、端口扫描、调用威胁情报抓取历史绑定url),单个扫描模块报告支持预览,全部报告支持汇总并一键下载。
URL:https://github.com/huan-cdm/auto_vuln_scan_system
标签:#漏洞扫描
更新了:漏洞扫描
描述:自动化漏洞扫描系统,包括IP基础信息探测模块(位置、属性、操作系统、端口、绑定的域名、公司名称、公司位置信息、网站标题、CDN信息、绑定网站指纹、子域名),漏洞扫描模块,(weblogic、struts2、nuclei、xray、rad、目录扫描、js链接扫描、端口扫描、调用威胁情报抓取历史绑定url),单个扫描模块报告支持预览,全部报告支持汇总并一键下载。
URL:https://github.com/huan-cdm/auto_vuln_scan_system
标签:#漏洞扫描
GitHub
GitHub - huan-cdm/info_scan: 自动化漏洞扫描系统,一键完成相关漏洞扫描和信息收集、资产处理、IP基础信息探测,系统采用B/S架构,系统分为源码安装和配置好环境的虚拟机,项目会持续更新,欢迎在Issues中提交需求,如果对您有…
自动化漏洞扫描系统,一键完成相关漏洞扫描和信息收集、资产处理、IP基础信息探测,系统采用B/S架构,系统分为源码安装和配置好环境的虚拟机,项目会持续更新,欢迎在Issues中提交需求,如果对您有所帮助,欢迎留下宝贵的star!!! - huan-cdm/info_scan
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability
URL:https://github.com/Athulya666/CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability
URL:https://github.com/Athulya666/CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - JAthulya/CVE-2024-23897: Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability
Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability - JAthulya/CVE-2024-23897
GitHub监控消息提醒!!!
更新了:webshell
描述:哥斯拉webshell管理工具二次开发规避流量检测设备
URL:https://github.com/kong030813/Z-Godzilla_ekp
标签:#webshell
更新了:webshell
描述:哥斯拉webshell管理工具二次开发规避流量检测设备
URL:https://github.com/kong030813/Z-Godzilla_ekp
标签:#webshell
GitHub
GitHub - ekkoo-z/Z-Godzilla_ekp: 哥斯拉webshell管理工具二次开发规避流量检测设备
哥斯拉webshell管理工具二次开发规避流量检测设备. Contribute to ekkoo-z/Z-Godzilla_ekp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for SQL Injection in CVE-2024-27956
URL:https://github.com/blue0x1/mobilemouse-exploit
标签:#RCE
更新了:RCE
描述:PoC for SQL Injection in CVE-2024-27956
URL:https://github.com/blue0x1/mobilemouse-exploit
标签:#RCE
GitHub
GitHub - blue0x1/mobilemouse-exploit: Mobile Mouse 3.6.0.4 could allow a remote attacker to execute arbitrary code on the system…
Mobile Mouse 3.6.0.4 could allow a remote attacker to execute arbitrary code on the system, caused by improper input validation. By sending a specially-crafted request, an attacker could exploit th...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-21413 Microsoft Outlook RCE Exploit
URL:https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-21413 Microsoft Outlook RCE Exploit
URL:https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit
标签:#CVE-2024
GitHub
GitHub - X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit: CVE-2024-21413 Microsoft Outlook RCE Exploit
CVE-2024-21413 Microsoft Outlook RCE Exploit. Contribute to X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-27956 WORDPRESS RCE PLUGIN
URL:https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-27956 WORDPRESS RCE PLUGIN
URL:https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN
标签:#CVE-2024
GitHub
GitHub - X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN: CVE-2024-27956 WORDPRESS RCE PLUGIN
CVE-2024-27956 WORDPRESS RCE PLUGIN. Contribute to X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-27956 WORDPRESS RCE PLUGIN
URL:https://github.com/gotr00t0day/CVE-2024-4040
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-27956 WORDPRESS RCE PLUGIN
URL:https://github.com/gotr00t0day/CVE-2024-4040
标签:#CVE-2024
GitHub
GitHub - gotr00t0day/CVE-2024-4040: A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and…
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outsid...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Critical RCE Vulnerabilities in HPE Aruba Devices (may 2024)
URL:https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits
标签:#CVE-2024
更新了:CVE-2024
描述:Critical RCE Vulnerabilities in HPE Aruba Devices (may 2024)
URL:https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/dragonked2/Egyscan
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/dragonked2/Egyscan
标签:#RCE
GitHub
GitHub - dragonked2/Egyscan: Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify…
Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malicious threats. Let's delve into the tasks a...
👍1
GitHub监控消息提醒!!!
更新了:内存马
描述:proof-of-concept for generating Java deserialization payload | Proxy MemShell 反序列化概念验证工具 | 动态代理实现内存马
URL:https://github.com/Whoopsunix/PPPYSO
标签:#内存马
更新了:内存马
描述:proof-of-concept for generating Java deserialization payload | Proxy MemShell 反序列化概念验证工具 | 动态代理实现内存马
URL:https://github.com/Whoopsunix/PPPYSO
标签:#内存马
GitHub
GitHub - Whoopsunix/PPPYSO: proof-of-concept for generating Java deserialization payload | Proxy MemShell
proof-of-concept for generating Java deserialization payload | Proxy MemShell - Whoopsunix/PPPYSO
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4439 PoC
URL:https://github.com/MielPopsssssss/CVE-2024-4439
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4439 PoC
URL:https://github.com/MielPopsssssss/CVE-2024-4439
标签:#CVE-2024
GitHub
GitHub - MielPopsssssss/CVE-2024-4439: CVE-2024-4439 PoC
CVE-2024-4439 PoC. Contribute to MielPopsssssss/CVE-2024-4439 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1.
URL:https://github.com/d0rb/CVE-2024-4439
标签:#CVE-2024
更新了:CVE-2024
描述:The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1.
URL:https://github.com/d0rb/CVE-2024-4439
标签:#CVE-2024
GitHub
GitHub - d0rb/CVE-2024-4439: The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439)…
The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1. - d0rb/CVE-2024-4439
GitHub监控消息提醒!!!
更新了:webshell
描述:php webshell bypass D盾、safedog、360、火绒等
URL:https://github.com/Inull-Studio/php_webshell
标签:#webshell
更新了:webshell
描述:php webshell bypass D盾、safedog、360、火绒等
URL:https://github.com/Inull-Studio/php_webshell
标签:#webshell
GitHub
GitHub - Inull-Studio/php_jsp_asp_webshell: php webshell bypass D盾、safedog、360、火绒等,仅支持php7
php webshell bypass D盾、safedog、360、火绒等,仅支持php7. Contribute to Inull-Studio/php_jsp_asp_webshell development by creating an account on GitHub.