GitHub监控消息提醒!!!
更新了:漏洞POC
描述:Fiora:漏洞PoC框架Nuclei的图形版。快捷搜索PoC、一键运行Nuclei。即可作为独立程序运行,也可作为burp插件使用。
URL:https://github.com/bit4woo/Fiora
标签:#漏洞POC
更新了:漏洞POC
描述:Fiora:漏洞PoC框架Nuclei的图形版。快捷搜索PoC、一键运行Nuclei。即可作为独立程序运行,也可作为burp插件使用。
URL:https://github.com/bit4woo/Fiora
标签:#漏洞POC
GitHub
GitHub - bit4woo/Fiora: Fiora:漏洞PoC框架Nuclei的图形版。快捷搜索PoC、一键运行Nuclei。即可作为独立程序运行,也可作为burp插件使用。
Fiora:漏洞PoC框架Nuclei的图形版。快捷搜索PoC、一键运行Nuclei。即可作为独立程序运行,也可作为burp插件使用。 - bit4woo/Fiora
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:自动化漏洞扫描系统,包括IP基础信息探测模块(位置、属性、操作系统、端口、绑定的域名、公司名称、公司位置信息、网站标题、CDN信息、绑定网站指纹、子域名),漏洞扫描模块,(weblogic、struts2、nuclei、xray、rad、目录扫描、js链接扫描、端口扫描、调用威胁情报抓取历史绑定url),单个扫描模块报告支持预览,全部报告支持汇总并一键下载。
URL:https://github.com/huan-cdm/auto_vuln_scan_system
标签:#漏洞扫描
更新了:漏洞扫描
描述:自动化漏洞扫描系统,包括IP基础信息探测模块(位置、属性、操作系统、端口、绑定的域名、公司名称、公司位置信息、网站标题、CDN信息、绑定网站指纹、子域名),漏洞扫描模块,(weblogic、struts2、nuclei、xray、rad、目录扫描、js链接扫描、端口扫描、调用威胁情报抓取历史绑定url),单个扫描模块报告支持预览,全部报告支持汇总并一键下载。
URL:https://github.com/huan-cdm/auto_vuln_scan_system
标签:#漏洞扫描
GitHub
GitHub - huan-cdm/info_scan: 自动化漏洞扫描系统,一键完成相关漏洞扫描和信息收集、资产处理、IP基础信息探测,系统采用B/S架构,系统分为源码安装和配置好环境的虚拟机,项目会持续更新,欢迎在Issues中提交需求,如果对您有…
自动化漏洞扫描系统,一键完成相关漏洞扫描和信息收集、资产处理、IP基础信息探测,系统采用B/S架构,系统分为源码安装和配置好环境的虚拟机,项目会持续更新,欢迎在Issues中提交需求,如果对您有所帮助,欢迎留下宝贵的star!!! - huan-cdm/info_scan
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability
URL:https://github.com/Athulya666/CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability
URL:https://github.com/Athulya666/CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - JAthulya/CVE-2024-23897: Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability
Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability - JAthulya/CVE-2024-23897
GitHub监控消息提醒!!!
更新了:webshell
描述:哥斯拉webshell管理工具二次开发规避流量检测设备
URL:https://github.com/kong030813/Z-Godzilla_ekp
标签:#webshell
更新了:webshell
描述:哥斯拉webshell管理工具二次开发规避流量检测设备
URL:https://github.com/kong030813/Z-Godzilla_ekp
标签:#webshell
GitHub
GitHub - ekkoo-z/Z-Godzilla_ekp: 哥斯拉webshell管理工具二次开发规避流量检测设备
哥斯拉webshell管理工具二次开发规避流量检测设备. Contribute to ekkoo-z/Z-Godzilla_ekp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for SQL Injection in CVE-2024-27956
URL:https://github.com/blue0x1/mobilemouse-exploit
标签:#RCE
更新了:RCE
描述:PoC for SQL Injection in CVE-2024-27956
URL:https://github.com/blue0x1/mobilemouse-exploit
标签:#RCE
GitHub
GitHub - blue0x1/mobilemouse-exploit: Mobile Mouse 3.6.0.4 could allow a remote attacker to execute arbitrary code on the system…
Mobile Mouse 3.6.0.4 could allow a remote attacker to execute arbitrary code on the system, caused by improper input validation. By sending a specially-crafted request, an attacker could exploit th...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-21413 Microsoft Outlook RCE Exploit
URL:https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-21413 Microsoft Outlook RCE Exploit
URL:https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit
标签:#CVE-2024
GitHub
GitHub - X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit: CVE-2024-21413 Microsoft Outlook RCE Exploit
CVE-2024-21413 Microsoft Outlook RCE Exploit. Contribute to X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-27956 WORDPRESS RCE PLUGIN
URL:https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-27956 WORDPRESS RCE PLUGIN
URL:https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN
标签:#CVE-2024
GitHub
GitHub - X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN: CVE-2024-27956 WORDPRESS RCE PLUGIN
CVE-2024-27956 WORDPRESS RCE PLUGIN. Contribute to X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-27956 WORDPRESS RCE PLUGIN
URL:https://github.com/gotr00t0day/CVE-2024-4040
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-27956 WORDPRESS RCE PLUGIN
URL:https://github.com/gotr00t0day/CVE-2024-4040
标签:#CVE-2024
GitHub
GitHub - gotr00t0day/CVE-2024-4040: A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and…
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outsid...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Critical RCE Vulnerabilities in HPE Aruba Devices (may 2024)
URL:https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits
标签:#CVE-2024
更新了:CVE-2024
描述:Critical RCE Vulnerabilities in HPE Aruba Devices (may 2024)
URL:https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/dragonked2/Egyscan
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/dragonked2/Egyscan
标签:#RCE
GitHub
GitHub - dragonked2/Egyscan: Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify…
Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malicious threats. Let's delve into the tasks a...
👍1
GitHub监控消息提醒!!!
更新了:内存马
描述:proof-of-concept for generating Java deserialization payload | Proxy MemShell 反序列化概念验证工具 | 动态代理实现内存马
URL:https://github.com/Whoopsunix/PPPYSO
标签:#内存马
更新了:内存马
描述:proof-of-concept for generating Java deserialization payload | Proxy MemShell 反序列化概念验证工具 | 动态代理实现内存马
URL:https://github.com/Whoopsunix/PPPYSO
标签:#内存马
GitHub
GitHub - Whoopsunix/PPPYSO: proof-of-concept for generating Java deserialization payload | Proxy MemShell
proof-of-concept for generating Java deserialization payload | Proxy MemShell - Whoopsunix/PPPYSO
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4439 PoC
URL:https://github.com/MielPopsssssss/CVE-2024-4439
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4439 PoC
URL:https://github.com/MielPopsssssss/CVE-2024-4439
标签:#CVE-2024
GitHub
GitHub - MielPopsssssss/CVE-2024-4439: CVE-2024-4439 PoC
CVE-2024-4439 PoC. Contribute to MielPopsssssss/CVE-2024-4439 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1.
URL:https://github.com/d0rb/CVE-2024-4439
标签:#CVE-2024
更新了:CVE-2024
描述:The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1.
URL:https://github.com/d0rb/CVE-2024-4439
标签:#CVE-2024
GitHub
GitHub - d0rb/CVE-2024-4439: The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439)…
The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1. - d0rb/CVE-2024-4439
GitHub监控消息提醒!!!
更新了:webshell
描述:php webshell bypass D盾、safedog、360、火绒等
URL:https://github.com/Inull-Studio/php_webshell
标签:#webshell
更新了:webshell
描述:php webshell bypass D盾、safedog、360、火绒等
URL:https://github.com/Inull-Studio/php_webshell
标签:#webshell
GitHub
GitHub - Inull-Studio/php_jsp_asp_webshell: php webshell bypass D盾、safedog、360、火绒等,仅支持php7
php webshell bypass D盾、safedog、360、火绒等,仅支持php7. Contribute to Inull-Studio/php_jsp_asp_webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:仿Wireshark纯抓包工具,加了个模糊匹配字节询问GPT是否为恶意数据。入侵监测反序列化系统
URL:https://github.com/godownio/Deserialize-Fyne-detect-GPTanwser
标签:#反序列化
更新了:反序列化
描述:仿Wireshark纯抓包工具,加了个模糊匹配字节询问GPT是否为恶意数据。入侵监测反序列化系统
URL:https://github.com/godownio/Deserialize-Fyne-detect-GPTanwser
标签:#反序列化
GitHub监控消息提醒!!!
更新了:RCE
描述:PPPwn - PlayStation 4 PPPoE RCE
URL:https://github.com/Ruulian/wconsole_extractor
标签:#RCE
更新了:RCE
描述:PPPwn - PlayStation 4 PPPoE RCE
URL:https://github.com/Ruulian/wconsole_extractor
标签:#RCE
GitHub
GitHub - Ruulian/wconsole_extractor: WConsole Extractor is a python library which automatically exploits a Werkzeug development…
WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a python function that leaks a file content and you have your...
GitHub监控消息提醒!!!
更新了:burp
描述:Alternative to burp's intruder built on top of httpx
URL:https://github.com/Giardi77/IntruderX
标签:#burp
更新了:burp
描述:Alternative to burp's intruder built on top of httpx
URL:https://github.com/Giardi77/IntruderX
标签:#burp
GitHub
GitHub - Giardi77/IntruderX: Alternative to burp's intruder built on top of httpx
Alternative to burp's intruder built on top of httpx - Giardi77/IntruderX