GitHub监控消息提醒!!!
更新了:RCE
描述:A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE
URL:https://github.com/byt3bl33d3r/ItWasAllADream
标签:#RCE
更新了:RCE
描述:A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE
URL:https://github.com/byt3bl33d3r/ItWasAllADream
标签:#RCE
GitHub
GitHub - byt3bl33d3r/ItWasAllADream: A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable…
A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE - byt3bl33d3r/ItWasAllADream
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A oxidized version of https://github.com/nettitude/CVE-2024-20356/blob/main/CVE-2024-20356.py
URL:https://github.com/SherllyNeo/CVE_2024_20356
标签:#CVE-2024
更新了:CVE-2024
描述:A oxidized version of https://github.com/nettitude/CVE-2024-20356/blob/main/CVE-2024-20356.py
URL:https://github.com/SherllyNeo/CVE_2024_20356
标签:#CVE-2024
GitHub
CVE-2024-20356/CVE-2024-20356.py at main · nettitude/CVE-2024-20356
This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC. - nettitude/CVE-2024-20356
GitHub监控消息提醒!!!
更新了:bypass av
描述:bypass av reverse shell in windows
URL:https://github.com/blue0x1/hannibal
标签:#bypass av
更新了:bypass av
描述:bypass av reverse shell in windows
URL:https://github.com/blue0x1/hannibal
标签:#bypass av
GitHub
GitHub - blue0x1/hannibal: bypass av reverse shell in windows
bypass av reverse shell in windows. Contribute to blue0x1/hannibal development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-32002=captain
URL:https://github.com/10cks/captain
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-32002=captain
URL:https://github.com/10cks/captain
标签:#CVE-2024
GitHub
GitHub - 10cks/captain
Contribute to 10cks/captain development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Time Based SQL Injection in Zabbix Server Audit Log --> RCE
URL:https://github.com/W01fh4cker/CVE-2024-22120-RCE
标签:#RCE
更新了:RCE
描述:Time Based SQL Injection in Zabbix Server Audit Log --> RCE
URL:https://github.com/W01fh4cker/CVE-2024-22120-RCE
标签:#RCE
GitHub
GitHub - W01fh4cker/CVE-2024-22120-RCE: Time Based SQL Injection in Zabbix Server Audit Log --> RCE
Time Based SQL Injection in Zabbix Server Audit Log --> RCE - W01fh4cker/CVE-2024-22120-RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024–2961 Security Issue Mitigation Script
URL:https://github.com/rvizx/CVE-2024-2961
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024–2961 Security Issue Mitigation Script
URL:https://github.com/rvizx/CVE-2024-2961
标签:#CVE-2024
GitHub
GitHub - rvizx/CVE-2024-2961: CVE-2024–2961 Security Issue Mitigation Script
CVE-2024–2961 Security Issue Mitigation Script. Contribute to rvizx/CVE-2024-2961 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Project Information Warfare (Demo XSS + RCE)
URL:https://github.com/onsra03/Project-Information-Warfare
标签:#RCE
更新了:RCE
描述:Project Information Warfare (Demo XSS + RCE)
URL:https://github.com/onsra03/Project-Information-Warfare
标签:#RCE
GitHub监控消息提醒!!!
更新了:反序列化
描述:照 golang 标准库 net/rpc,实现了服务端以及支持并发的客户端,并且支持选择不同的序列化与反序列化方式;为了防止服务挂死,在其中一些关键部分添加了超时处理机制;支持 TCP、Unix、HTTP 等多种传输协议;支持多种负载均衡模式,最后还实现了一个简易的服务注册和发现中心
URL:https://github.com/Forrest-Tao/geerpc
标签:#反序列化
更新了:反序列化
描述:照 golang 标准库 net/rpc,实现了服务端以及支持并发的客户端,并且支持选择不同的序列化与反序列化方式;为了防止服务挂死,在其中一些关键部分添加了超时处理机制;支持 TCP、Unix、HTTP 等多种传输协议;支持多种负载均衡模式,最后还实现了一个简易的服务注册和发现中心
URL:https://github.com/Forrest-Tao/geerpc
标签:#反序列化
GitHub
GitHub - Forrest-Tao/geerpc: 照 golang 标准库 net/rpc,实现了服务端以及支持并发的客户端,并且支持选择不同的序列化与反序列化方式;为了防止服务挂死,在其中一些关键部分添加了超时处理机制;支持 TCP、Unix、HTTP…
照 golang 标准库 net/rpc,实现了服务端以及支持并发的客户端,并且支持选择不同的序列化与反序列化方式;为了防止服务挂死,在其中一些关键部分添加了超时处理机制;支持 TCP、Unix、HTTP 等多种传输协议;支持多种负载均衡模式,最后还实现了一个简易的服务注册和发现中心 - Forrest-Tao/geerpc
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4367 Proof of Concept
URL:https://github.com/LOURC0D3/CVE-2024-4367-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4367 Proof of Concept
URL:https://github.com/LOURC0D3/CVE-2024-4367-PoC
标签:#CVE-2024
GitHub
GitHub - LOURC0D3/CVE-2024-4367-PoC: CVE-2024-4367 & CVE-2024-34342 Proof of Concept
CVE-2024-4367 & CVE-2024-34342 Proof of Concept. Contribute to LOURC0D3/CVE-2024-4367-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF).
URL:https://github.com/SeanPesce/CVE-2024-22243
标签:#CVE-2024
更新了:CVE-2024
描述:Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF).
URL:https://github.com/SeanPesce/CVE-2024-22243
标签:#CVE-2024
GitHub
GitHub - SeanPesce/CVE-2024-22243: Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect…
Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF). - SeanPesce/CVE-2024-22243
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution.
URL:https://github.com/skilfoy/CVE-2024-4323-Exploit-POC
标签:#CVE-2024
更新了:CVE-2024
描述:This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution.
URL:https://github.com/skilfoy/CVE-2024-4323-Exploit-POC
标签:#CVE-2024
GitHub
GitHub - skilfoy/CVE-2024-4323-Exploit-POC: This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption…
This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution. - skilfoy/CVE-2024-4323-Exploit-POC
GitHub监控消息提醒!!!
更新了:渗透测试
描述:只用于渗透测试和网络安全相关工具的Scoop bucket仓库。Scoop bucket for Penetration Testing and Cybersecurity related tools.
URL:https://github.com/s0nd9r/scoop-security
标签:#渗透测试
更新了:渗透测试
描述:只用于渗透测试和网络安全相关工具的Scoop bucket仓库。Scoop bucket for Penetration Testing and Cybersecurity related tools.
URL:https://github.com/s0nd9r/scoop-security
标签:#渗透测试
GitHub
GitHub - s0nd9r/scoop-security: Scoop bucket for Penetration Testing and Cybersecurity related tools.用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。
Scoop bucket for Penetration Testing and Cybersecurity related tools.用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。 - s0nd9r/scoop-security
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4367 arbitrary js execution in pdf js
URL:https://github.com/s4vvysec/CVE-2024-4367-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4367 arbitrary js execution in pdf js
URL:https://github.com/s4vvysec/CVE-2024-4367-POC
标签:#CVE-2024
GitHub
GitHub - s4vvysec/CVE-2024-4367-POC: CVE-2024-4367 arbitrary js execution in pdf js
CVE-2024-4367 arbitrary js execution in pdf js. Contribute to s4vvysec/CVE-2024-4367-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款基于各大企业信息API的工具,解决在遇到的各种针对国内企业信息收集难题。一键收集控股公司ICP备案、APP、小程序、微信公众号等信息聚合导出。
URL:https://github.com/codeTopcn/2828
标签:#信息收集
更新了:信息收集
描述:一款基于各大企业信息API的工具,解决在遇到的各种针对国内企业信息收集难题。一键收集控股公司ICP备案、APP、小程序、微信公众号等信息聚合导出。
URL:https://github.com/codeTopcn/2828
标签:#信息收集
GitHub监控消息提醒!!!
更新了:钓鱼
描述:申明:仅供教学演示,禁用非法、未授权等进行钓鱼,后果自负。
URL:https://github.com/AlphabugX/Watering-Hole-Attack
标签:#钓鱼
更新了:钓鱼
描述:申明:仅供教学演示,禁用非法、未授权等进行钓鱼,后果自负。
URL:https://github.com/AlphabugX/Watering-Hole-Attack
标签:#钓鱼
GitHub
GitHub - AlphabugX/Watering-Hole-Attack: 申明:仅供教学演示,禁用非法、未授权等进行钓鱼,后果自负。
申明:仅供教学演示,禁用非法、未授权等进行钓鱼,后果自负。. Contribute to AlphabugX/Watering-Hole-Attack development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Patch your D-Link device affected by CVE-2024-3272
URL:https://github.com/aliask/dinkleberry
标签:#CVE-2024
更新了:CVE-2024
描述:Patch your D-Link device affected by CVE-2024-3272
URL:https://github.com/aliask/dinkleberry
标签:#CVE-2024
GitHub
GitHub - aliask/dinkleberry: Patch your D-Link device affected by CVE-2024-3272
Patch your D-Link device affected by CVE-2024-3272 - GitHub - aliask/dinkleberry: Patch your D-Link device affected by CVE-2024-3272
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This Python script is designed as a proof-of-concept (PoC) for the CVE-2024-27130 vulnerability in QNAP QTS
URL:https://github.com/d0rb/CVE-2024-27130
标签:#CVE-2024
更新了:CVE-2024
描述:This Python script is designed as a proof-of-concept (PoC) for the CVE-2024-27130 vulnerability in QNAP QTS
URL:https://github.com/d0rb/CVE-2024-27130
标签:#CVE-2024
GitHub
GitHub - d0rb/CVE-2024-27130: This Python script is designed as a proof-of-concept (PoC) for the CVE-2024-27130 vulnerability in…
This Python script is designed as a proof-of-concept (PoC) for the CVE-2024-27130 vulnerability in QNAP QTS - d0rb/CVE-2024-27130
GitHub监控消息提醒!!!
更新了:攻防
描述:AAA - 2023 短学期安全攻防实践开源仓库(已整合入 ctf_summer_courses)
URL:https://github.com/team-s2/summer_course_2023
标签:#攻防
更新了:攻防
描述:AAA - 2023 短学期安全攻防实践开源仓库(已整合入 ctf_summer_courses)
URL:https://github.com/team-s2/summer_course_2023
标签:#攻防
GitHub
GitHub - team-s2/summer_course_2023: AAA - 2023 短学期安全攻防实践开源仓库(已整合入 ctf_summer_courses)
AAA - 2023 短学期安全攻防实践开源仓库(已整合入 ctf_summer_courses). Contribute to team-s2/summer_course_2023 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-32002 hook POC
URL:https://github.com/Roronoawjd/hook
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-32002 hook POC
URL:https://github.com/Roronoawjd/hook
标签:#CVE-2024
GitHub
GitHub - Roronoawjd/hook: CVE-2024-32002 hook POC
CVE-2024-32002 hook POC. Contribute to Roronoawjd/hook development by creating an account on GitHub.