GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof Of Concept that exploits PuTTy CVE-2024-31497.
URL:https://github.com/HugoBond/CVE-2024-31497-POC
标签:#CVE-2024
更新了:CVE-2024
描述:Proof Of Concept that exploits PuTTy CVE-2024-31497.
URL:https://github.com/HugoBond/CVE-2024-31497-POC
标签:#CVE-2024
GitHub
GitHub - HugoBond/CVE-2024-31497-POC: Proof Of Concept that exploits PuTTy CVE-2024-31497.
Proof Of Concept that exploits PuTTy CVE-2024-31497. - HugoBond/CVE-2024-31497-POC
GitHub监控消息提醒!!!
更新了:免杀
描述:darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,目前免杀火绒,360,360核晶。
URL:https://github.com/fdx-xdf/darkPulse
标签:#免杀
更新了:免杀
描述:darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,目前免杀火绒,360,360核晶。
URL:https://github.com/fdx-xdf/darkPulse
标签:#免杀
GitHub
GitHub - fdx-xdf/darkPulse: darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,免杀火绒,360核晶等国内常见杀软。
darkPulse是一个用go编写的shellcode Packer,用于生成各种各样的shellcode loader,免杀火绒,360核晶等国内常见杀软。 - fdx-xdf/darkPulse
GitHub监控消息提醒!!!
更新了:反序列化
描述:通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF 的防护。
URL:https://github.com/ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook
标签:#反序列化
更新了:反序列化
描述:通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF 的防护。
URL:https://github.com/ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook
标签:#反序列化
GitHub
GitHub - ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook: 通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF…
通过 Java 反序列化利用 Java Agent 技术来实现 UTF-8 Overlong Encoding,从而绕过某些 WAF 的防护。 - ZhiQiAnSecFork/Java-UTF8-Overlong-WAF-Bypass-Hook
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34220 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34220
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34220 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34220
标签:#CVE-2024
GitHub
GitHub - dovankha/CVE-2024-34220: CVE-2024-34220 | SQL injection
CVE-2024-34220 | SQL injection. Contribute to dovankha/CVE-2024-34220 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34222 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34222
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34222 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34222
标签:#CVE-2024
GitHub
GitHub - dovankha/CVE-2024-34222: CVE-2024-34222 | SQL injection
CVE-2024-34222 | SQL injection. Contribute to dovankha/CVE-2024-34222 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34223 | Insecure permission
URL:https://github.com/dovankha/CVE-2024-34223
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34223 | Insecure permission
URL:https://github.com/dovankha/CVE-2024-34223
标签:#CVE-2024
GitHub
GitHub - dovankha/CVE-2024-34223: CVE-2024-34223 | Insecure permission
CVE-2024-34223 | Insecure permission. Contribute to dovankha/CVE-2024-34223 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34226 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34226
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34226 | SQL injection
URL:https://github.com/dovankha/CVE-2024-34226
标签:#CVE-2024
GitHub
GitHub - dovankha/CVE-2024-34226: CVE-2024-34226 | SQL injection
CVE-2024-34226 | SQL injection. Contribute to dovankha/CVE-2024-34226 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:HTB Room Nibbles - Python3 RCE Script
URL:https://github.com/cybersecaware/HTB-Nibbles
标签:#RCE
更新了:RCE
描述:HTB Room Nibbles - Python3 RCE Script
URL:https://github.com/cybersecaware/HTB-Nibbles
标签:#RCE
GitHub
GitHub - cybersecaware/HTB-Nibbles: HTB Room Nibbles - Python3 RCE Script
HTB Room Nibbles - Python3 RCE Script. Contribute to cybersecaware/HTB-Nibbles development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Poc for CVE-2024-1561 affecting Gradio 4.12.0
URL:https://github.com/DiabloHTB/CVE-2024-1561
标签:#CVE-2024
更新了:CVE-2024
描述:Poc for CVE-2024-1561 affecting Gradio 4.12.0
URL:https://github.com/DiabloHTB/CVE-2024-1561
标签:#CVE-2024
GitHub
GitHub - DiabloHTB/CVE-2024-1561: Poc for CVE-2024-1561 affecting Gradio 4.12.0
Poc for CVE-2024-1561 affecting Gradio 4.12.0. Contribute to DiabloHTB/CVE-2024-1561 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:越权
描述:攻防演练过程中,我们通常会用浏览器访问一些资产,但很多未授权/敏感信息/越权隐匿在已访问接口过html、JS文件等,该插件能让我们发现未授权/敏感信息/越权/登陆接口等。
URL:https://github.com/codeTopcn/3015
标签:#越权
更新了:越权
描述:攻防演练过程中,我们通常会用浏览器访问一些资产,但很多未授权/敏感信息/越权隐匿在已访问接口过html、JS文件等,该插件能让我们发现未授权/敏感信息/越权/登陆接口等。
URL:https://github.com/codeTopcn/3015
标签:#越权
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-32523 Mailster <= 4.0.6 - Unauthenticated Local File Inclusion
URL:https://github.com/truonghuuphuc/CVE-2024-32523-Poc
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-32523 Mailster <= 4.0.6 - Unauthenticated Local File Inclusion
URL:https://github.com/truonghuuphuc/CVE-2024-32523-Poc
标签:#CVE-2024
GitHub
GitHub - truonghuuphuc/CVE-2024-32523-Poc: CVE-2024-32523 Mailster <= 4.0.6 - Unauthenticated Local File Inclusion
CVE-2024-32523 Mailster <= 4.0.6 - Unauthenticated Local File Inclusion - truonghuuphuc/CVE-2024-32523-Poc
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Exploit CVE-2024-22393
URL:https://github.com/omranisecurity/CVE-2024-22393
标签:#CVE-2024
更新了:CVE-2024
描述:Exploit CVE-2024-22393
URL:https://github.com/omranisecurity/CVE-2024-22393
标签:#CVE-2024
GitHub
GitHub - omranisecurity/CVE-2024-22393: Exploit for CVE-2024-22393 Unrestricted Upload of File with Dangerous Type vulnerability…
Exploit for CVE-2024-22393 Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer. - omranisecurity/CVE-2024-22393
GitHub监控消息提醒!!!
更新了:getshell
描述:Simple interactive shell from PHP webshell
URL:https://github.com/lautarovculic/getShell
标签:#getshell
更新了:getshell
描述:Simple interactive shell from PHP webshell
URL:https://github.com/lautarovculic/getShell
标签:#getshell
GitHub
GitHub - lautarovculic/getShell: Simple interactive shell from PHP webshell
Simple interactive shell from PHP webshell. Contribute to lautarovculic/getShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:C++ rewrite of PPPwn (PlayStation 4 PPPoE RCE)
URL:https://github.com/xfangfang/PPPwn_cpp
标签:#RCE
更新了:RCE
描述:C++ rewrite of PPPwn (PlayStation 4 PPPoE RCE)
URL:https://github.com/xfangfang/PPPwn_cpp
标签:#RCE
GitHub
GitHub - xfangfang/PPPwn_cpp: C++ rewrite of PPPwn (PlayStation 4 PPPoE RCE)
C++ rewrite of PPPwn (PlayStation 4 PPPoE RCE). Contribute to xfangfang/PPPwn_cpp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内存马
描述:PyAnonymous(Py匿名)是一个基于Python3的无落地内存马加载解决方案
URL:https://github.com/Leeyangee/PyAnonymous
标签:#内存马
更新了:内存马
描述:PyAnonymous(Py匿名)是一个基于Python3的无落地内存马加载解决方案
URL:https://github.com/Leeyangee/PyAnonymous
标签:#内存马
GitHub
GitHub - Leeyangee/PyAnonymous: PyAnonymous是一个应用于渗透测试场景下基于Python3的无落地内存马加载解决方案
PyAnonymous是一个应用于渗透测试场景下基于Python3的无落地内存马加载解决方案. Contribute to Leeyangee/PyAnonymous development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:Linux通用应急响应脚本,适用大多数情况
URL:https://github.com/Ashro-one/Ashro_linux
标签:#应急响应
更新了:应急响应
描述:Linux通用应急响应脚本,适用大多数情况
URL:https://github.com/Ashro-one/Ashro_linux
标签:#应急响应
GitHub
GitHub - Ashro-one/Ashro_linux: Linux通用应急响应脚本,适用大多数情况。不如手敲
Linux通用应急响应脚本,适用大多数情况。不如手敲. Contribute to Ashro-one/Ashro_linux development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
URL:https://github.com/Aabyss-Team/ARL
标签:#渗透测试
更新了:渗透测试
描述:ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
URL:https://github.com/Aabyss-Team/ARL
标签:#渗透测试
GitHub
GitHub - Aabyss-Team/ARL: ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人…
ARL官方仓库备份项目:ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。 - Aabyss-Team/ARL