GitHub监控消息提醒!!!
更新了:RCE
描述:Implement SAST+DAST checks using github actions against a vulnerable python application which allows RCE. Goal is to detect it before it gets pushed into production.
URL:https://github.com/Anon-Exploiter/sast-dast
标签:#RCE
更新了:RCE
描述:Implement SAST+DAST checks using github actions against a vulnerable python application which allows RCE. Goal is to detect it before it gets pushed into production.
URL:https://github.com/Anon-Exploiter/sast-dast
标签:#RCE
GitHub
GitHub - Anon-Exploiter/sast-dast: Implement SAST+DAST checks using github actions against a vulnerable python application which…
Implement SAST+DAST checks using github actions against a vulnerable python application which allows RCE. Goal is to detect it before it gets pushed into production. - Anon-Exploiter/sast-dast
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal
URL:https://github.com/verylazytech/CVE-2024-4956
标签:#CVE-2024
更新了:CVE-2024
描述:POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal
URL:https://github.com/verylazytech/CVE-2024-4956
标签:#CVE-2024
GitHub
GitHub - verylazytech/CVE-2024-4956: POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal
POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal - verylazytech/CVE-2024-4956
GitHub监控消息提醒!!!
更新了:webshell
描述:python简单webshell,用于远程管理
URL:https://github.com/Leeyangee/python_webshell
标签:#webshell
更新了:webshell
描述:python简单webshell,用于远程管理
URL:https://github.com/Leeyangee/python_webshell
标签:#webshell
GitHub
GitHub - Leeyangee/python_webshell: python简单webshell,用于蚁剑远程管理
python简单webshell,用于蚁剑远程管理. Contribute to Leeyangee/python_webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Python script to automate the process of finding vulnerable sites for CVE-2024-24919.
URL:https://github.com/protonnegativo/CVE-2024-24919
标签:#CVE-2024
更新了:CVE-2024
描述:Python script to automate the process of finding vulnerable sites for CVE-2024-24919.
URL:https://github.com/protonnegativo/CVE-2024-24919
标签:#CVE-2024
GitHub
GitHub - protonnegativo/CVE-2024-24919: Python script to automate the process of finding vulnerable sites for CVE-2024-24919.
Python script to automate the process of finding vulnerable sites for CVE-2024-24919. - protonnegativo/CVE-2024-24919
GitHub监控消息提醒!!!
更新了:Red Team
描述:Offensive Penetration Testing and Red Teamer methodologies, documentation & scripts.
URL:https://github.com/0xScorpio/Ethical-Hacking
标签:#Red Team
更新了:Red Team
描述:Offensive Penetration Testing and Red Teamer methodologies, documentation & scripts.
URL:https://github.com/0xScorpio/Ethical-Hacking
标签:#Red Team
GitHub
GitHub - 0xScorpio/Ethical-Hacking: Offensive Penetration Testing and Red Teamer methodologies, documentation & scripts.
Offensive Penetration Testing and Red Teamer methodologies, documentation & scripts. - GitHub - 0xScorpio/Ethical-Hacking: Offensive Penetration Testing and Red Teamer methodologies, docum...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)
URL:https://github.com/sinsinology/CVE-2024-29849
标签:#CVE-2024
更新了:CVE-2024
描述:Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)
URL:https://github.com/sinsinology/CVE-2024-29849
标签:#CVE-2024
GitHub
GitHub - sinsinology/CVE-2024-29849: Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)
Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849) - sinsinology/CVE-2024-29849
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Bash script that checks if a PHP CGI setup is vulnerable to the CVE-2024-4577 argument injection vulnerability
URL:https://github.com/it-t4mpan/check_cve_2024_4577.sh
标签:#CVE-2024
更新了:CVE-2024
描述:Bash script that checks if a PHP CGI setup is vulnerable to the CVE-2024-4577 argument injection vulnerability
URL:https://github.com/it-t4mpan/check_cve_2024_4577.sh
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:Medfusion 4000 security research & a MQX RCE
URL:https://github.com/emtee40/medfusion-4000-research
标签:#RCE
更新了:RCE
描述:Medfusion 4000 security research & a MQX RCE
URL:https://github.com/emtee40/medfusion-4000-research
标签:#RCE
GitHub
GitHub - emtee40/medfusion-4000-research: Medfusion 4000 security research & a MQX RCE
Medfusion 4000 security research & a MQX RCE. Contribute to emtee40/medfusion-4000-research development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution
URL:https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT
标签:#RCE
更新了:RCE
描述:A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution
URL:https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT
标签:#RCE
GitHub
GitHub - K3ysTr0K3R/CVE-2024-4577-EXPLOIT: A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)
A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE) - K3ysTr0K3R/CVE-2024-4577-EXPLOIT
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Vulnerability check script for CVE-2024-37393 (SecurEnvoy MFA 9.4.513)
URL:https://github.com/optistream/securenvoy-cve-2024-37393
标签:#CVE-2024
更新了:CVE-2024
描述:Vulnerability check script for CVE-2024-37393 (SecurEnvoy MFA 9.4.513)
URL:https://github.com/optistream/securenvoy-cve-2024-37393
标签:#CVE-2024
GitHub
GitHub - noways-io/securenvoy-cve-2024-37393: Vulnerability check script for CVE-2024-37393 (SecurEnvoy MFA 9.4.513)
Vulnerability check script for CVE-2024-37393 (SecurEnvoy MFA 9.4.513) - noways-io/securenvoy-cve-2024-37393
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:The public reference that contains the minimum require information for the vulnerability covered by CVE-2024-36821
URL:https://github.com/IvanGlinkin/CVE-2024-36821
标签:#CVE-2024
更新了:CVE-2024
描述:The public reference that contains the minimum require information for the vulnerability covered by CVE-2024-36821
URL:https://github.com/IvanGlinkin/CVE-2024-36821
标签:#CVE-2024
GitHub
GitHub - IvanGlinkin/CVE-2024-36821: The public reference that contains the minimum require information for the vulnerability covered…
The public reference that contains the minimum require information for the vulnerability covered by CVE-2024-36821 - IvanGlinkin/CVE-2024-36821
GitHub监控消息提醒!!!
更新了:Red Team
描述:Este projeto demonstra como testar a vulnerabilidade de redes wireless e simular operações de Red Team usando Crunch e Aircrack-ng.
URL:https://github.com/AlldDev/Wifi-Hacking-Example
标签:#Red Team
更新了:Red Team
描述:Este projeto demonstra como testar a vulnerabilidade de redes wireless e simular operações de Red Team usando Crunch e Aircrack-ng.
URL:https://github.com/AlldDev/Wifi-Hacking-Example
标签:#Red Team
GitHub
GitHub - AlldDev/Wifi-Hacking-Example: Este projeto demonstra como testar a vulnerabilidade de redes wireless e simular operações…
Este projeto demonstra como testar a vulnerabilidade de redes wireless e simular operações de Red Team usando Crunch e Aircrack-ng. - AlldDev/Wifi-Hacking-Example
GitHub监控消息提醒!!!
更新了:信息收集
描述:一款Go Wails实现的渗透测试工具,功能涵盖网站扫描、端口扫描、企业信息收集、空间引擎搜索等,希望能帮助你少让你少开几个应用测试
URL:https://github.com/lzp0518/UPfamDB
标签:#信息收集
更新了:信息收集
描述:一款Go Wails实现的渗透测试工具,功能涵盖网站扫描、端口扫描、企业信息收集、空间引擎搜索等,希望能帮助你少让你少开几个应用测试
URL:https://github.com/lzp0518/UPfamDB
标签:#信息收集
GitHub
lzp0518/UPfamDB
UPfamDB(Unknown Protein Families Database)是一个综合性的生物信息学数据库, 旨在收集和分类蛋白质序列,包括那些尚未被充分研究的序列。它通过将蛋白质归类到具有共同祖先和相似功能的家族中, 提供了一个系统化的方法来研究蛋白质的结构、功能和进化。UPfamDB不仅包含序列信息,还提供蛋白质结构数据,这对于 深入理解蛋白质功能和指导新药设计至关重要。数据库定...
GitHub监控消息提醒!!!
更新了:免杀
描述:一个简单的远程分离的加载器,免杀国内大部分杀软(360 火绒 Windows Defender 金山毒霸 电脑管家)
URL:https://github.com/1K0ng/C_Sep_Loader
标签:#免杀
更新了:免杀
描述:一个简单的远程分离的加载器,免杀国内大部分杀软(360 火绒 Windows Defender 金山毒霸 电脑管家)
URL:https://github.com/1K0ng/C_Sep_Loader
标签:#免杀
GitHub
GitHub - 1K0ng/C_Sep_Loader: 一个简单的远程分离的加载器,免杀国内大部分杀软(360 火绒 Windows Defender 金山毒霸 电脑管家)
一个简单的远程分离的加载器,免杀国内大部分杀软(360 火绒 Windows Defender 金山毒霸 电脑管家) - 1K0ng/C_Sep_Loader
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Basic POC to test CVE-2024-3094
URL:https://github.com/shefirot/CVE-2024-3094
标签:#CVE-2024
更新了:CVE-2024
描述:Basic POC to test CVE-2024-3094
URL:https://github.com/shefirot/CVE-2024-3094
标签:#CVE-2024
GitHub
GitHub - shefirot/CVE-2024-3094: Basic POC to test CVE-2024-3094 vulnerability inside K8s cluster
Basic POC to test CVE-2024-3094 vulnerability inside K8s cluster - shefirot/CVE-2024-3094
GitHub监控消息提醒!!!
更新了:RCE
描述:Office 365 Excel URI scheme RCE
URL:https://github.com/sahar042/Microsoft_URI_SCHEME_RCE
标签:#RCE
更新了:RCE
描述:Office 365 Excel URI scheme RCE
URL:https://github.com/sahar042/Microsoft_URI_SCHEME_RCE
标签:#RCE
GitHub
GitHub - sahar042/Microsoft_URI_SCHEME_RCE: Office 365 Excel URI scheme RCE
Office 365 Excel URI scheme RCE. Contribute to sahar042/Microsoft_URI_SCHEME_RCE development by creating an account on GitHub.