GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Tool for validating / testing CVE-2024-36416
URL:https://github.com/kva55/CVE-2024-36416
标签:#CVE-2024
更新了:CVE-2024
描述:Tool for validating / testing CVE-2024-36416
URL:https://github.com/kva55/CVE-2024-36416
标签:#CVE-2024
GitHub
GitHub - kva55/CVE-2024-36416: Tool for validating / testing CVE-2024-36416
Tool for validating / testing CVE-2024-36416. Contribute to kva55/CVE-2024-36416 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC for CVE-2024-4577 with Shodan integration
URL:https://github.com/d3ck4/Shodan-CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:POC for CVE-2024-4577 with Shodan integration
URL:https://github.com/d3ck4/Shodan-CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - d3ck4/Shodan-CVE-2024-4577: POC for CVE-2024-4577 with Shodan integration
POC for CVE-2024-4577 with Shodan integration. Contribute to d3ck4/Shodan-CVE-2024-4577 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass av
描述:HeavenlyBypassAV免杀工具
URL:https://github.com/vxCrypt0r/Voidgate
标签:#bypass av
更新了:bypass av
描述:HeavenlyBypassAV免杀工具
URL:https://github.com/vxCrypt0r/Voidgate
标签:#bypass av
GitHub
GitHub - vxCrypt0r/Voidgate: A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known…
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。
URL:https://github.com/Maikefee/BurpAutoProxySwitcherPlugins
标签:#渗透测试
更新了:渗透测试
描述:红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。
URL:https://github.com/Maikefee/BurpAutoProxySwitcherPlugins
标签:#渗透测试
GitHub
GitHub - Maikefee/BurpAutoProxySwitcherPlugins_Maikefee: 红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。
红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。 - Maikefee/BurpAutoProxySwitcherPlugins_Maikefee
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:BOF implementations of CVE-2024-26229 for Cobalt Strike and Brute Ratel
URL:https://github.com/Cerbersec/CVE-2024-26229-BOF
标签:#CVE-2024
更新了:CVE-2024
描述:BOF implementations of CVE-2024-26229 for Cobalt Strike and Brute Ratel
URL:https://github.com/Cerbersec/CVE-2024-26229-BOF
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation
URL:https://github.com/truonghuuphuc/CVE-2024-4898-Poc
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation
URL:https://github.com/truonghuuphuc/CVE-2024-4898-Poc
标签:#CVE-2024
GitHub
GitHub - truonghuuphuc/CVE-2024-4898-Poc: CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing…
CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:DRive a poc backdoor exploiting CVE-2024-26229 for privilege escalation and persistence
URL:https://github.com/0XJ175/DRive
标签:#CVE-2024
更新了:CVE-2024
描述:DRive a poc backdoor exploiting CVE-2024-26229 for privilege escalation and persistence
URL:https://github.com/0XJ175/DRive
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/pandahacker2763/CVE-2024-24590
标签:#CVE-2024
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/pandahacker2763/CVE-2024-24590
标签:#CVE-2024
GitHub
GitHub - DemonPandaz2763/CVE-2024-24590: Another CVE-2024-24590 poc
Another CVE-2024-24590 poc. Contribute to DemonPandaz2763/CVE-2024-24590 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/DemonPandaz2763/CVE-2024-24590
标签:#CVE-2024
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/DemonPandaz2763/CVE-2024-24590
标签:#CVE-2024
GitHub
GitHub - DemonPandaz2763/CVE-2024-24590: Another CVE-2024-24590 poc
Another CVE-2024-24590 poc. Contribute to DemonPandaz2763/CVE-2024-24590 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/-
标签:#绕过
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/-
标签:#绕过
GitHub
GitHub - simpkinstimothy84/FUD-Crypter-Windows-Defender: 折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。. Contribute to simpkinstimothy84/FUD-Crypter-Windows-Defender development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Generate a base64 encoded Pickle RCE payload
URL:https://github.com/0xAlmighty/Pickle-Payload-Generator
标签:#RCE
更新了:RCE
描述:Generate a base64 encoded Pickle RCE payload
URL:https://github.com/0xAlmighty/Pickle-Payload-Generator
标签:#RCE
GitHub
GitHub - 0xAlmighty/Pickle-Payload-Generator: Generate base64 encoded Pickle payload
Generate base64 encoded Pickle payload. Contribute to 0xAlmighty/Pickle-Payload-Generator development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/FUD-Crypter-Windows-Defender
标签:#绕过
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/FUD-Crypter-Windows-Defender
标签:#绕过
GitHub
GitHub - simpkinstimothy84/FUD-Crypter-Windows-Defender: 折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。. Contribute to simpkinstimothy84/FUD-Crypter-Windows-Defender development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-4484
标签:#CVE-2024
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-4484
标签:#CVE-2024
GitHub
GitHub - Abo5/CVE-2024-4484: This script uses HTTParty to detect stored cross-site scripting (XSS) vulnerabilities in WordPress…
This script uses HTTParty to detect stored cross-site scripting (XSS) vulnerabilities in WordPress sites using the xai_username parameter. It sends a payload to the specified URL and checks if the ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-27282
标签:#CVE-2024
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-27282
标签:#CVE-2024
GitHub
GitHub - Abo5/CVE-2024-27282: script to detect if the installed Ruby version on your system is vulnerable to CVE-2024-27282. You…
script to detect if the installed Ruby version on your system is vulnerable to CVE-2024-27282. You should read the description of the vulnerability for more details: https://www.ruby-lang.org/en/ne...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-31210
标签:#CVE-2024
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-31210
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Valve Press - CVE-2024-27956-RCE - SQL Injection
URL:https://github.com/TadashiJei/Valve-Press-CVE-2024-27956-RCE
标签:#CVE-2024
更新了:CVE-2024
描述:Valve Press - CVE-2024-27956-RCE - SQL Injection
URL:https://github.com/TadashiJei/Valve-Press-CVE-2024-27956-RCE
标签:#CVE-2024
GitHub
GitHub - TadashiJei/Valve-Press-CVE-2024-27956-RCE: Valve Press - CVE-2024-27956-RCE - SQL Injection
Valve Press - CVE-2024-27956-RCE - SQL Injection. Contribute to TadashiJei/Valve-Press-CVE-2024-27956-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)
URL:https://github.com/jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS
标签:#CVE-2024
更新了:CVE-2024
描述:Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)
URL:https://github.com/jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS
标签:#CVE-2024
GitHub
GitHub - jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS: Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)
Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692) - jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:使用python编写的php-cgi解析漏洞扫描器,大三课程设计作品
URL:https://github.com/ho2kin/PHP-CGI-Scanner
标签:#漏洞扫描
更新了:漏洞扫描
描述:使用python编写的php-cgi解析漏洞扫描器,大三课程设计作品
URL:https://github.com/ho2kin/PHP-CGI-Scanner
标签:#漏洞扫描
GitHub
GitHub - ho2kin/PHP-CGI-Scanner: 个人课程设计作品
个人课程设计作品. Contribute to ho2kin/PHP-CGI-Scanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:kubernetes container filebrowser and webshell
URL:https://github.com/busybox-org/kubefilebrowser
标签:#webshell
更新了:webshell
描述:kubernetes container filebrowser and webshell
URL:https://github.com/busybox-org/kubefilebrowser
标签:#webshell
GitHub
GitHub - busybox-org/kubefilebrowser: kubernetes container file browser. Is a simple web application that allows you to browse…
kubernetes container file browser. Is a simple web application that allows you to browse and edit files in a kubernetes container. - busybox-org/kubefilebrowser