GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28279
URL:https://github.com/unrealjbr/CVE-2024-28279
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28279
URL:https://github.com/unrealjbr/CVE-2024-28279
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:提权
描述:Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
URL:https://github.com/openctp/openctp
标签:#提权
更新了:提权
描述:Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
URL:https://github.com/openctp/openctp
标签:#提权
GitHub
GitHub - openctp/openctp: openctp提供CTP股票期权、中泰证券XTP、华鑫证券奇点TORA、东方证券OST、东方财富证券EMT、盈透证券TWS、易盛TAP、量投QDP等各通道的CTPAPI兼容接口,CTP程序可以无缝对接…
openctp提供CTP股票期权、中泰证券XTP、华鑫证券奇点TORA、东方证券OST、东方财富证券EMT、盈透证券TWS、易盛TAP、量投QDP等各通道的CTPAPI兼容接口,CTP程序可以无缝对接各股票柜台。openctp也提供了一套基于TTS交易系统的模拟环境,同样提供了CTPAPI兼容接口,不仅支持国内期货与期权全品种,也支持A股股票、基金、债券以及股票期权模拟交易,可以替代Simn...
GitHub监控消息提醒!!!
更新了:RCE
描述:heapdump泄露Shiro key从而RCE的漏洞环境
URL:https://github.com/P4r4d1se/heapdump_shiro_vuln
标签:#RCE
更新了:RCE
描述:heapdump泄露Shiro key从而RCE的漏洞环境
URL:https://github.com/P4r4d1se/heapdump_shiro_vuln
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-24787 Proof of Concept
URL:https://github.com/LOURC0D3/CVE-2024-24787-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-24787 Proof of Concept
URL:https://github.com/LOURC0D3/CVE-2024-24787-PoC
标签:#CVE-2024
GitHub
GitHub - LOURC0D3/CVE-2024-24787-PoC: CVE-2024-24787 Proof of Concept
CVE-2024-24787 Proof of Concept. Contribute to LOURC0D3/CVE-2024-24787-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:电子书籍-代码审计-域渗透(内网思路)-免杀-云安全
URL:https://github.com/WangHao1117/Student-performance-management-system
标签:#代码审计
更新了:代码审计
描述:电子书籍-代码审计-域渗透(内网思路)-免杀-云安全
URL:https://github.com/WangHao1117/Student-performance-management-system
标签:#代码审计
GitHub
GitHub - WangHao1117/Student-Performance-Management-System: 此项目采用Python实现学生成绩管理,支持教师录入、修改成绩,学生查询成绩,并提供分析功能。系统结构清晰,易于集成,便于维护和扩展。
此项目采用Python实现学生成绩管理,支持教师录入、修改成绩,学生查询成绩,并提供分析功能。系统结构清晰,易于集成,便于维护和扩展。 - WangHao1117/Student-Performance-Management-System
GitHub监控消息提醒!!!
更新了:RCE
描述:Includes XSS, RCE and SSRF Vulnerabilities.
URL:https://github.com/plutonlib/Secure-Software-Development-Project
标签:#RCE
更新了:RCE
描述:Includes XSS, RCE and SSRF Vulnerabilities.
URL:https://github.com/plutonlib/Secure-Software-Development-Project
标签:#RCE
GitHub
GitHub - plutonmoyai/zafiyetli-emlak-uygulamasi: Emlak Uygulamasi
Emlak Uygulamasi. Contribute to plutonmoyai/zafiyetli-emlak-uygulamasi development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34310
URL:https://github.com/3309899621/CVE-2024-34310
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34310
URL:https://github.com/3309899621/CVE-2024-34310
标签:#CVE-2024
GitHub
GitHub - 3309899621/CVE-2024-34310: CVE-2024-34310
CVE-2024-34310. Contribute to 3309899621/CVE-2024-34310 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof Of Concept that exploits PuTTy CVE-2024-31497.
URL:https://github.com/HugoBond/CVE-2024-31497-POC
标签:#CVE-2024
更新了:CVE-2024
描述:Proof Of Concept that exploits PuTTy CVE-2024-31497.
URL:https://github.com/HugoBond/CVE-2024-31497-POC
标签:#CVE-2024
GitHub
GitHub - HugoBond/CVE-2024-31497-POC: Proof Of Concept that exploits PuTTy CVE-2024-31497.
Proof Of Concept that exploits PuTTy CVE-2024-31497. - HugoBond/CVE-2024-31497-POC
GitHub监控消息提醒!!!
更新了:免杀
描述:darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,目前免杀火绒,360,360核晶。
URL:https://github.com/fdx-xdf/darkPulse
标签:#免杀
更新了:免杀
描述:darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,目前免杀火绒,360,360核晶。
URL:https://github.com/fdx-xdf/darkPulse
标签:#免杀
GitHub
GitHub - fdx-xdf/darkPulse: darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,免杀火绒,360核晶等国内常见杀软。
darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,免杀火绒,360核晶等国内常见杀软。 - fdx-xdf/darkPulse
GitHub监控消息提醒!!!
更新了:反序列化
描述:通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF 的防护。
URL:https://github.com/ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook
标签:#反序列化
更新了:反序列化
描述:通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF 的防护。
URL:https://github.com/ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook
标签:#反序列化
GitHub
GitHub - ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook: 通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF…
通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF 的防护。 - ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34220 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34220
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34220 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34220
标签:#CVE-2024
GitHub
GitHub - dovankha/CVE-2024-34220: CVE-2024-34220 | SQL injection
CVE-2024-34220 | SQL injection. Contribute to dovankha/CVE-2024-34220 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34222 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34222
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34222 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34222
标签:#CVE-2024
GitHub
GitHub - dovankha/CVE-2024-34222: CVE-2024-34222 | SQL injection
CVE-2024-34222 | SQL injection. Contribute to dovankha/CVE-2024-34222 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34223 | Insecure permission
URL:https://github.com/dovankha/CVE-2024-34223
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34223 | Insecure permission
URL:https://github.com/dovankha/CVE-2024-34223
标签:#CVE-2024
GitHub
GitHub - dovankha/CVE-2024-34223: CVE-2024-34223 | Insecure permission
CVE-2024-34223 | Insecure permission. Contribute to dovankha/CVE-2024-34223 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34226 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34226
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34226 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34226
标签:#CVE-2024
GitHub
GitHub - dovankha/CVE-2024-34226: CVE-2024-34226 | SQL injection
CVE-2024-34226 | SQL injection. Contribute to dovankha/CVE-2024-34226 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:HTB Room Nibbles - Python3 RCE Script
URL:https://github.com/cybersecaware/HTB-Nibbles
标签:#RCE
更新了:RCE
描述:HTB Room Nibbles - Python3 RCE Script
URL:https://github.com/cybersecaware/HTB-Nibbles
标签:#RCE
GitHub
GitHub - cybersecaware/HTB-Nibbles: HTB Room Nibbles - Python3 RCE Script
HTB Room Nibbles - Python3 RCE Script. Contribute to cybersecaware/HTB-Nibbles development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Poc for CVE-2024-1561 affecting Gradio 4.12.0
URL:https://github.com/DiabloHTB/CVE-2024-1561
标签:#CVE-2024
更新了:CVE-2024
描述:Poc for CVE-2024-1561 affecting Gradio 4.12.0
URL:https://github.com/DiabloHTB/CVE-2024-1561
标签:#CVE-2024
GitHub
GitHub - DiabloHTB/CVE-2024-1561: Poc for CVE-2024-1561 affecting Gradio 4.12.0
Poc for CVE-2024-1561 affecting Gradio 4.12.0. Contribute to DiabloHTB/CVE-2024-1561 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:越权
描述:攻防演练过程中,我们通常会用浏览器访问一些资产,但很多未授权/敏感信息/越权隐匿在已访问接口过html、JS文件等,该插件能让我们发现未授权/敏感信息/越权/登陆接口等。
URL:https://github.com/codeTopcn/3015
标签:#越权
更新了:越权
描述:攻防演练过程中,我们通常会用浏览器访问一些资产,但很多未授权/敏感信息/越权隐匿在已访问接口过html、JS文件等,该插件能让我们发现未授权/敏感信息/越权/登陆接口等。
URL:https://github.com/codeTopcn/3015
标签:#越权