GitHub监控消息提醒!!!
更新了:漏洞利用
描述:项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
URL:https://github.com/0x727/SpringBootExploit
更新了:漏洞利用
描述:项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
URL:https://github.com/0x727/SpringBootExploit
GitHub
GitHub - SummerSec/SpringBootExploit: 项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。 - SummerSec/SpringBootExploit
GitHub监控消息提醒!!!
更新了:红队
描述:大宝剑-边界资产梳理工具(红队、蓝队、企业组织架构、子域名、Web资产梳理、Web指纹识别、ICON_Hash资产匹配)
URL:https://github.com/XRSec/DBJ
更新了:红队
描述:大宝剑-边界资产梳理工具(红队、蓝队、企业组织架构、子域名、Web资产梳理、Web指纹识别、ICON_Hash资产匹配)
URL:https://github.com/XRSec/DBJ
GitHub
GitHub - XRSec/DBJ: 大宝剑-边界资产梳理工具(红队、蓝队、企业组织架构、子域名、Web资产梳理、Web指纹识别、ICON_Hash资产匹配)
大宝剑-边界资产梳理工具(红队、蓝队、企业组织架构、子域名、Web资产梳理、Web指纹识别、ICON_Hash资产匹配) - XRSec/DBJ
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:h2-jdbc(https://github.com/h2database/h2database/issues/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reduce.
URL:https://github.com/SecCoder-Security-Lab/jdbc-sqlxml-xxe
更新了:CVE-2021
描述:h2-jdbc(https://github.com/h2database/h2database/issues/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reduce.
URL:https://github.com/SecCoder-Security-Lab/jdbc-sqlxml-xxe
GitHub
Report a H2-Database-Engine SQLXML XXE vulnerability · Issue #3195 · h2database/h2database
Hello, I am threedr3am of SecCoder Security Lab (contact@seccoder.club). We found a security vulnerability(SCSL-2021-1001) in the H2-Database-Engine jar when using this component to connect to the ...
GitHub监控消息提醒!!!
更新了:免杀
描述::cat2:Medusa是一个红队武器库平台,目前包括XSS平台、协同平台、CVE监控、免杀生成、DNSLOG、钓鱼邮件等功能,持续开发中
URL:https://github.com/sarmolt/molt
更新了:免杀
描述::cat2:Medusa是一个红队武器库平台,目前包括XSS平台、协同平台、CVE监控、免杀生成、DNSLOG、钓鱼邮件等功能,持续开发中
URL:https://github.com/sarmolt/molt
GitHub
GitHub - sarmolt/molt: 银行卡四件套,对公账户八件套,出支付宝,微信号已实名绑卡,实名认证绑卡,大量U回卡,卡回U,全新实名手机卡大量现货,专业金融服务 代收款Rmb换外币。 #银行卡 #四件套 #银行卡四件套 #对公账户 #八件套…
银行卡四件套,对公账户八件套,出支付宝,微信号已实名绑卡,实名认证绑卡,大量U回卡,卡回U,全新实名手机卡大量现货,专业金融服务 代收款Rmb换外币。 #银行卡 #四件套 #银行卡四件套 #对公账户 #八件套 #博彩 #菠菜 #棋牌 #钱庄 #跑分 #洗黑 #洗钱 #洗白 #出黑 #支付 #代收 #二维码 #人民币 #菲律宾 #柬埔寨 #缅甸 #台湾 黑客 入侵 渗透 社工 爆破 波菜 ...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A Cobalt Strike Scanner that retrives detected Team Server beacons into a JSON object
URL:https://github.com/splunk/melting-cobalt
更新了:Cobalt Strike
描述:A Cobalt Strike Scanner that retrives detected Team Server beacons into a JSON object
URL:https://github.com/splunk/melting-cobalt
GitHub
GitHub - splunk/melting-cobalt: A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object
A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object - splunk/melting-cobalt
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A \"hooray I am useful\" Cobalt Strike Team Server scanner
URL:https://github.com/d1vious/zoidbergstrike
更新了:Cobalt Strike
描述:A \"hooray I am useful\" Cobalt Strike Team Server scanner
URL:https://github.com/d1vious/zoidbergstrike
GitHub
GitHub - d1vious/zoidbergstrike: A "hooray I am useful" Cobalt Strike Team Server scanner
A "hooray I am useful" Cobalt Strike Team Server scanner - GitHub - d1vious/zoidbergstrike: A "hooray I am useful" Cobalt Strike Team Server scanner
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC for CVE-2021-2471 - XXE in MySQL Connector/J
URL:https://github.com/DrunkenShells/CVE-2021-2471
更新了:CVE-2021
描述:PoC for CVE-2021-2471 - XXE in MySQL Connector/J
URL:https://github.com/DrunkenShells/CVE-2021-2471
GitHub
GitHub - DrunkenShells/CVE-2021-2471: PoC for CVE-2021-2471 - XXE in MySQL Connector/J
PoC for CVE-2021-2471 - XXE in MySQL Connector/J. Contribute to DrunkenShells/CVE-2021-2471 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Dotnet 5 Red Teaming C# Application
URL:https://github.com/ctorres80/ceph-samba
更新了:Red Team
描述:Dotnet 5 Red Teaming C# Application
URL:https://github.com/ctorres80/ceph-samba
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Web UI for creating C2 profiles for Cobalt Strike
URL:https://github.com/XRSec/CobaltStrike-Update
更新了:Cobalt Strike
描述:Web UI for creating C2 profiles for Cobalt Strike
URL:https://github.com/XRSec/CobaltStrike-Update
GitHub
GitHub - XRSec/CobaltStrike-Update: Cobalt Strike is a powerful threat emulation tool that provides a post-exploitation agent and…
Cobalt Strike is a powerful threat emulation tool that provides a post-exploitation agent and covert channels ideal for Adversary Simulations and Red Team exercises. With Cobalt Strike, companies c...
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
URL:https://github.com/0x727/SpringBootExploit
更新了:漏洞利用
描述:项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
URL:https://github.com/0x727/SpringBootExploit
GitHub
GitHub - SummerSec/SpringBootExploit: 项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。 - SummerSec/SpringBootExploit
GitHub监控消息提醒!!!
更新了:红队
描述:大宝剑-边界资产梳理工具(红队、蓝队、企业组织架构、子域名、Web资产梳理、Web指纹识别、ICON_Hash资产匹配)
URL:https://github.com/XRSec/DBJ
更新了:红队
描述:大宝剑-边界资产梳理工具(红队、蓝队、企业组织架构、子域名、Web资产梳理、Web指纹识别、ICON_Hash资产匹配)
URL:https://github.com/XRSec/DBJ
GitHub
GitHub - XRSec/DBJ: 大宝剑-边界资产梳理工具(红队、蓝队、企业组织架构、子域名、Web资产梳理、Web指纹识别、ICON_Hash资产匹配)
大宝剑-边界资产梳理工具(红队、蓝队、企业组织架构、子域名、Web资产梳理、Web指纹识别、ICON_Hash资产匹配) - XRSec/DBJ
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A Zeek package which raises notices for Path Traversal/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)
URL:https://github.com/corelight/CVE-2021-41773
更新了:CVE-2021
描述:A Zeek package which raises notices for Path Traversal/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)
URL:https://github.com/corelight/CVE-2021-41773
GitHub
GitHub - corelight/CVE-2021-41773: A Zeek package which raises notices for Path Traversal/RCE in Apache HTTP Server 2.4.49 (CVE…
A Zeek package which raises notices for Path Traversal/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013) - corelight/CVE-2021-41773
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:My exploit for CVE-2021-40449, a Windows LPE via a UAF in win32kfull!GreResetDCInternal.
URL:https://github.com/hakivvi/CVE-2021-40449
更新了:CVE-2021
描述:My exploit for CVE-2021-40449, a Windows LPE via a UAF in win32kfull!GreResetDCInternal.
URL:https://github.com/hakivvi/CVE-2021-40449
GitHub
GitHub - hakivvi/CVE-2021-40449: LPE exploit for a UAF in Windows (CVE-2021-40449).
LPE exploit for a UAF in Windows (CVE-2021-40449). - hakivvi/CVE-2021-40449
GitHub监控消息提醒!!!
更新了:Red Team
描述:All in one script to download and run Atomic Red Team tests via powershell.
URL:https://github.com/chisho21/atomic-red-team-testing
更新了:Red Team
描述:All in one script to download and run Atomic Red Team tests via powershell.
URL:https://github.com/chisho21/atomic-red-team-testing
GitHub
GitHub - chisho21/atomic-red-team-testing: All in one script to download and run Atomic Red Team tests via powershell.
All in one script to download and run Atomic Red Team tests via powershell. - GitHub - chisho21/atomic-red-team-testing: All in one script to download and run Atomic Red Team tests via powershell.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Google Chrome Vulnerabilities CVE-2021-30573
URL:https://github.com/oxctdev/CVE-2021-30573
更新了:CVE-2021
描述:Google Chrome Vulnerabilities CVE-2021-30573
URL:https://github.com/oxctdev/CVE-2021-30573
GitHub
GitHub - orangmuda/CVE-2021-30573: Google Chrome Vulnerabilities CVE-2021-30573
Google Chrome Vulnerabilities CVE-2021-30573. Contribute to orangmuda/CVE-2021-30573 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-41773 is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49
URL:https://github.com/walnutsecurity/cve-2021-41773
更新了:CVE-2021
描述:CVE-2021-41773 is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49
URL:https://github.com/walnutsecurity/cve-2021-41773
GitHub
GitHub - walnutsecurity/cve-2021-41773: cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote…
cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49 - walnutsecurity/cve-2021-41773
GitHub监控消息提醒!!!
更新了:Red Team
描述:This is a basic Linux binary shim on the passwd binary from the shadow package. Used by the RIT Red Team for competitions
URL:https://github.com/PapaChain/Retriever
更新了:Red Team
描述:This is a basic Linux binary shim on the passwd binary from the shadow package. Used by the RIT Red Team for competitions
URL:https://github.com/PapaChain/Retriever
GitHub
GitHub - PapaChain/Retriever: This is a basic Linux binary shim on the passwd binary from the shadow package. Used by the RIT Red…
This is a basic Linux binary shim on the passwd binary from the shadow package. Used by the RIT Red Team for competitions - GitHub - PapaChain/Retriever: This is a basic Linux binary shim on the p...
GitHub监控消息提醒!!!
更新了:Red Team
描述:This is a basic Linux binary shim on the passwd binary from the shadow package. Used by the RIT Red Team for competitions
URL:https://github.com/ctorres80/ceph-samba
更新了:Red Team
描述:This is a basic Linux binary shim on the passwd binary from the shadow package. Used by the RIT Red Team for competitions
URL:https://github.com/ctorres80/ceph-samba
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC for the CVE-2021-20837 : RCE in MovableType
URL:https://github.com/ghost-nemesis/cve-2021-20837-poc
更新了:CVE-2021
描述:PoC for the CVE-2021-20837 : RCE in MovableType
URL:https://github.com/ghost-nemesis/cve-2021-20837-poc
GitHub
GitHub - ghost-nemesis/cve-2021-20837-poc: PoC for the CVE-2021-20837 : RCE in MovableType
PoC for the CVE-2021-20837 : RCE in MovableType. Contribute to ghost-nemesis/cve-2021-20837-poc development by creating an account on GitHub.