GitHub监控消息提醒!!!
更新了:RCE
描述:Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)
URL:https://github.com/kaist-hacking/CVE-2023-6702
标签:#RCE
更新了:RCE
描述:Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)
URL:https://github.com/kaist-hacking/CVE-2023-6702
标签:#RCE
GitHub
GitHub - kaist-hacking/CVE-2023-6702: Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)
Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission) - kaist-hacking/CVE-2023-6702
GitHub监控消息提醒!!!
更新了:代码审计
描述:Jcahub是一个专注于Java代码审计的靶场,致力于为初学者提供实践和学习Java代码审计的平台。
URL:https://github.com/wsYu9a/Jcahub
标签:#代码审计
更新了:代码审计
描述:Jcahub是一个专注于Java代码审计的靶场,致力于为初学者提供实践和学习Java代码审计的平台。
URL:https://github.com/wsYu9a/Jcahub
标签:#代码审计
GitHub
GitHub - wsYu9a/Jcahub: Jcahub是一个专注于Java代码审计的靶场,致力于为初学者提供实践和学习Java代码审计的平台。
Jcahub是一个专注于Java代码审计的靶场,致力于为初学者提供实践和学习Java代码审计的平台。 - wsYu9a/Jcahub
GitHub监控消息提醒!!!
更新了:信息收集
描述:该项目旨在通过抓取来自各个开源社区和代码仓库的信息收集和分析 DeFi中的漏洞和安全风险。
URL:https://github.com/Cheyukj/Defi-Vulnerability-Collector
标签:#信息收集
更新了:信息收集
描述:该项目旨在通过抓取来自各个开源社区和代码仓库的信息收集和分析 DeFi中的漏洞和安全风险。
URL:https://github.com/Cheyukj/Defi-Vulnerability-Collector
标签:#信息收集
GitHub
GitHub - Cheyukj/Defi-Vulnerability-Collector: 该项目旨在通过抓取来自各个开源社区和代码仓库的信息收集和分析 DeFi中的漏洞和安全风险。
该项目旨在通过抓取来自各个开源社区和代码仓库的信息收集和分析 DeFi中的漏洞和安全风险。. Contribute to Cheyukj/Defi-Vulnerability-Collector development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:a Proof of Concept of CVE-2024-24919
URL:https://github.com/bigb0x/CVE-2024-24919-Sniper
标签:#CVE-2024
更新了:CVE-2024
描述:a Proof of Concept of CVE-2024-24919
URL:https://github.com/bigb0x/CVE-2024-24919-Sniper
标签:#CVE-2024
GitHub
GitHub - bigb0x/CVE-2024-24919-Sniper: CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024…
CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multithreading, and generates detailed CSV r...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-24919
URL:https://github.com/SpeedyQweku/CVE-2024-24919
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-24919
URL:https://github.com/SpeedyQweku/CVE-2024-24919
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.
URL:https://github.com/AkselSoft-Hub/remote-code-execution-sample
标签:#RCE
更新了:RCE
描述:Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.
URL:https://github.com/AkselSoft-Hub/remote-code-execution-sample
标签:#RCE
GitHub
GitHub - AkselSoft-Hub/remote-code-execution-sample: Demonstrate how usage of the Java Security Manager can prevent Remote Code…
Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits. - AkselSoft-Hub/remote-code-execution-sample
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34832
URL:https://github.com/julio-cfa/CVE-2024-34832
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34832
URL:https://github.com/julio-cfa/CVE-2024-34832
标签:#CVE-2024
GitHub
GitHub - julio-cfa/CVE-2024-34832: CVE-2024-34832
CVE-2024-34832. Contribute to julio-cfa/CVE-2024-34832 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述: CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access.
URL:https://github.com/Rug4lo/CVE-2024-24919-Exploit
标签:#CVE-2024
更新了:CVE-2024
描述: CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access.
URL:https://github.com/Rug4lo/CVE-2024-24919-Exploit
标签:#CVE-2024
GitHub
GitHub - Rug4lo/CVE-2024-24919-Exploit: CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access.
CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access. - Rug4lo/CVE-2024-24919-Exploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Mitel Collab Local Privilege Escalation CVE-2024-35315 PoC
URL:https://github.com/ewilded/CVE-2024-35315-POC
标签:#CVE-2024
更新了:CVE-2024
描述:Mitel Collab Local Privilege Escalation CVE-2024-35315 PoC
URL:https://github.com/ewilded/CVE-2024-35315-POC
标签:#CVE-2024
GitHub
GitHub - ewilded/CVE-2024-35315-POC: Mitel Collab Local Privilege Escalation CVE-2024-35315 PoC
Mitel Collab Local Privilege Escalation CVE-2024-35315 PoC - ewilded/CVE-2024-35315-POC
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Apache OFBIZ Path traversal leading to RCE EXP
URL:https://github.com/Mr-xn/CVE-2024-32113
标签:#CVE-2024
更新了:CVE-2024
描述:Apache OFBIZ Path traversal leading to RCE EXP
URL:https://github.com/Mr-xn/CVE-2024-32113
标签:#CVE-2024
GitHub
GitHub - Mr-xn/CVE-2024-32113: Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]
Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104] - Mr-xn/CVE-2024-32113
GitHub监控消息提醒!!!
更新了:RCE
描述:New exploit for Apache APISIX 2.12.1 - Remote Code Execution (RCE)
URL:https://github.com/btar1gan/exploit_CVE-2022-24112
标签:#RCE
更新了:RCE
描述:New exploit for Apache APISIX 2.12.1 - Remote Code Execution (RCE)
URL:https://github.com/btar1gan/exploit_CVE-2022-24112
标签:#RCE
GitHub
GitHub - btar1gan/exploit_CVE-2022-24112: New exploit for Apache APISIX v2.12.1 - Remote code execution (RCE)
New exploit for Apache APISIX v2.12.1 - Remote code execution (RCE) - btar1gan/exploit_CVE-2022-24112
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Nmap script to check vulnerability CVE-2024-24919
URL:https://github.com/GuayoyoCyber/CVE-2024-24919
标签:#CVE-2024
更新了:CVE-2024
描述:Nmap script to check vulnerability CVE-2024-24919
URL:https://github.com/GuayoyoCyber/CVE-2024-24919
标签:#CVE-2024
GitHub
GitHub - GuayoyoCyber/CVE-2024-24919: Nmap script to check vulnerability CVE-2024-24919
Nmap script to check vulnerability CVE-2024-24919. Contribute to GuayoyoCyber/CVE-2024-24919 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-27348 Proof of concept Exploit - Unauthenticated RCE in Apache HugeGraph Server
URL:https://github.com/kljunowsky/CVE-2024-27348
标签:#RCE
更新了:RCE
描述:CVE-2024-27348 Proof of concept Exploit - Unauthenticated RCE in Apache HugeGraph Server
URL:https://github.com/kljunowsky/CVE-2024-27348
标签:#RCE
GitHub
GitHub - kljunowsky/CVE-2024-27348: Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit
Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit - GitHub - kljunowsky/CVE-2024-27348: Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of c...
GitHub监控消息提醒!!!
更新了:RCE
描述:Minecraft RCE - log4j
URL:https://github.com/GabrYLive/Minecraft-RCE
标签:#RCE
更新了:RCE
描述:Minecraft RCE - log4j
URL:https://github.com/GabrYLive/Minecraft-RCE
标签:#RCE
GitHub
GitHub - GabrYLive/Minecraft-RCE: Minecraft RCE - log4j
Minecraft RCE - log4j. Contribute to GabrYLive/Minecraft-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:php webshell bypass D盾、safedog、360、火绒等,仅支持php7
URL:https://github.com/Inull-Studio/php_jsp_asp_webshell
标签:#webshell
更新了:webshell
描述:php webshell bypass D盾、safedog、360、火绒等,仅支持php7
URL:https://github.com/Inull-Studio/php_jsp_asp_webshell
标签:#webshell
GitHub
GitHub - Inull-Studio/php_jsp_asp_webshell: php webshell bypass D盾、safedog、360、火绒等,仅支持php7
php webshell bypass D盾、safedog、360、火绒等,仅支持php7. Contribute to Inull-Studio/php_jsp_asp_webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:将json中不支持的Date和Bytes(Buffer)用安全的方法序列化,并在反序列化后找回对应的类型(而不是字符串)
URL:https://github.com/CaoMeiYouRen/safe-json-type
标签:#反序列化
更新了:反序列化
描述:将json中不支持的Date和Bytes(Buffer)用安全的方法序列化,并在反序列化后找回对应的类型(而不是字符串)
URL:https://github.com/CaoMeiYouRen/safe-json-type
标签:#反序列化
GitHub
GitHub - CaoMeiYouRen/safe-json-type: 将json中不支持的Date和Bytes(Buffer)用安全的方法序列化,并在反序列化后找回对应的类型(而不是字符串)
将json中不支持的Date和Bytes(Buffer)用安全的方法序列化,并在反序列化后找回对应的类型(而不是字符串) - CaoMeiYouRen/safe-json-type
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc.
URL:https://github.com/exfil0/test_iconv
标签:#CVE-2024
更新了:CVE-2024
描述:This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc.
URL:https://github.com/exfil0/test_iconv
标签:#CVE-2024
GitHub
GitHub - exfil0/test_iconv: This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in…
This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc. - exfil0/test_iconv
GitHub监控消息提醒!!!
更新了:Red Team
描述:This is my personal collection where I write my own Offensive Tools and Scripts for Red Teaming purpose...
URL:https://github.com/sartlabs/OffensiveTools
标签:#Red Team
更新了:Red Team
描述:This is my personal collection where I write my own Offensive Tools and Scripts for Red Teaming purpose...
URL:https://github.com/sartlabs/OffensiveTools
标签:#Red Team
GitHub
GitHub - sartlabs/OffensiveTools: This is my personal collection where I write my own Offensive Tools and Scripts for Red Teaming…
This is my personal collection where I write my own Offensive Tools and Scripts for Red Teaming purpose... - sartlabs/OffensiveTools