GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-26517
URL:https://github.com/unrealjbr/CVE-2024-26517
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-26517
URL:https://github.com/unrealjbr/CVE-2024-26517
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-26026: BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION
URL:https://github.com/passwa11/CVE-2024-26026
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-26026: BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION
URL:https://github.com/passwa11/CVE-2024-26026
标签:#CVE-2024
GitHub
GitHub - passwa11/CVE-2024-26026: CVE-2024-26026: BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION
CVE-2024-26026: BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION - passwa11/CVE-2024-26026
GitHub监控消息提醒!!!
更新了:红队
描述:Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
URL:https://github.com/HFUT-CHEATER/HFUTCheaterCollection
标签:#红队
更新了:红队
描述:Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
URL:https://github.com/HFUT-CHEATER/HFUTCheaterCollection
标签:#红队
GitHub监控消息提醒!!!
更新了:权限提升
描述:Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
URL:https://github.com/coldpon/runasSystemOrTrustedinstaller
标签:#权限提升
更新了:权限提升
描述:Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
URL:https://github.com/coldpon/runasSystemOrTrustedinstaller
标签:#权限提升
GitHub
GitHub - coldpon/runasSystemOrTrustedinstaller: get privilege to System or Trustedinstaller
get privilege to System or Trustedinstaller. Contribute to coldpon/runasSystemOrTrustedinstaller development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:An undead PHP RCE backdoor, RSA encrypted
URL:https://github.com/goudunz1/php-backdoor
标签:#RCE
更新了:RCE
描述:An undead PHP RCE backdoor, RSA encrypted
URL:https://github.com/goudunz1/php-backdoor
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28276
URL:https://github.com/unrealjbr/CVE-2024-28276
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28276
URL:https://github.com/unrealjbr/CVE-2024-28276
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28277
URL:https://github.com/unrealjbr/CVE-2024-28277
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28277
URL:https://github.com/unrealjbr/CVE-2024-28277
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28279
URL:https://github.com/unrealjbr/CVE-2024-28279
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28279
URL:https://github.com/unrealjbr/CVE-2024-28279
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:提权
描述:Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
URL:https://github.com/openctp/openctp
标签:#提权
更新了:提权
描述:Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
URL:https://github.com/openctp/openctp
标签:#提权
GitHub
GitHub - openctp/openctp: openctp提供CTP股票期权、中泰证券XTP、华鑫证券奇点TORA、东方证券OST、东方财富证券EMT、盈透证券TWS、易盛TAP、量投QDP等各通道的CTPAPI兼容接口,CTP程序可以无缝对接…
openctp提供CTP股票期权、中泰证券XTP、华鑫证券奇点TORA、东方证券OST、东方财富证券EMT、盈透证券TWS、易盛TAP、量投QDP等各通道的CTPAPI兼容接口,CTP程序可以无缝对接各股票柜台。openctp也提供了一套基于TTS交易系统的模拟环境,同样提供了CTPAPI兼容接口,不仅支持国内期货与期权全品种,也支持A股股票、基金、债券以及股票期权模拟交易,可以替代Simn...
GitHub监控消息提醒!!!
更新了:RCE
描述:heapdump泄露Shiro key从而RCE的漏洞环境
URL:https://github.com/P4r4d1se/heapdump_shiro_vuln
标签:#RCE
更新了:RCE
描述:heapdump泄露Shiro key从而RCE的漏洞环境
URL:https://github.com/P4r4d1se/heapdump_shiro_vuln
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-24787 Proof of Concept
URL:https://github.com/LOURC0D3/CVE-2024-24787-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-24787 Proof of Concept
URL:https://github.com/LOURC0D3/CVE-2024-24787-PoC
标签:#CVE-2024
GitHub
GitHub - LOURC0D3/CVE-2024-24787-PoC: CVE-2024-24787 Proof of Concept
CVE-2024-24787 Proof of Concept. Contribute to LOURC0D3/CVE-2024-24787-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:电子书籍-代码审计-域渗透(内网思路)-免杀-云安全
URL:https://github.com/WangHao1117/Student-performance-management-system
标签:#代码审计
更新了:代码审计
描述:电子书籍-代码审计-域渗透(内网思路)-免杀-云安全
URL:https://github.com/WangHao1117/Student-performance-management-system
标签:#代码审计
GitHub
GitHub - WangHao1117/Student-Performance-Management-System: 此项目采用Python实现学生成绩管理,支持教师录入、修改成绩,学生查询成绩,并提供分析功能。系统结构清晰,易于集成,便于维护和扩展。
此项目采用Python实现学生成绩管理,支持教师录入、修改成绩,学生查询成绩,并提供分析功能。系统结构清晰,易于集成,便于维护和扩展。 - WangHao1117/Student-Performance-Management-System
GitHub监控消息提醒!!!
更新了:RCE
描述:Includes XSS, RCE and SSRF Vulnerabilities.
URL:https://github.com/plutonlib/Secure-Software-Development-Project
标签:#RCE
更新了:RCE
描述:Includes XSS, RCE and SSRF Vulnerabilities.
URL:https://github.com/plutonlib/Secure-Software-Development-Project
标签:#RCE
GitHub
GitHub - plutonmoyai/zafiyetli-emlak-uygulamasi: Emlak Uygulamasi
Emlak Uygulamasi. Contribute to plutonmoyai/zafiyetli-emlak-uygulamasi development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34310
URL:https://github.com/3309899621/CVE-2024-34310
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34310
URL:https://github.com/3309899621/CVE-2024-34310
标签:#CVE-2024
GitHub
GitHub - 3309899621/CVE-2024-34310: CVE-2024-34310
CVE-2024-34310. Contribute to 3309899621/CVE-2024-34310 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof Of Concept that exploits PuTTy CVE-2024-31497.
URL:https://github.com/HugoBond/CVE-2024-31497-POC
标签:#CVE-2024
更新了:CVE-2024
描述:Proof Of Concept that exploits PuTTy CVE-2024-31497.
URL:https://github.com/HugoBond/CVE-2024-31497-POC
标签:#CVE-2024
GitHub
GitHub - HugoBond/CVE-2024-31497-POC: Proof Of Concept that exploits PuTTy CVE-2024-31497.
Proof Of Concept that exploits PuTTy CVE-2024-31497. - HugoBond/CVE-2024-31497-POC
GitHub监控消息提醒!!!
更新了:免杀
描述:darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,目前免杀火绒,360,360核晶。
URL:https://github.com/fdx-xdf/darkPulse
标签:#免杀
更新了:免杀
描述:darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,目前免杀火绒,360,360核晶。
URL:https://github.com/fdx-xdf/darkPulse
标签:#免杀
GitHub
GitHub - fdx-xdf/darkPulse: darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,免杀火绒,360核晶等国内常见杀软。
darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,免杀火绒,360核晶等国内常见杀软。 - fdx-xdf/darkPulse
GitHub监控消息提醒!!!
更新了:反序列化
描述:通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF 的防护。
URL:https://github.com/ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook
标签:#反序列化
更新了:反序列化
描述:通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF 的防护。
URL:https://github.com/ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook
标签:#反序列化
GitHub
GitHub - ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook: 通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF…
通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF 的防护。 - ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34220 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34220
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34220 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34220
标签:#CVE-2024
GitHub
GitHub - dovankha/CVE-2024-34220: CVE-2024-34220 | SQL injection
CVE-2024-34220 | SQL injection. Contribute to dovankha/CVE-2024-34220 development by creating an account on GitHub.