GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow
URL:https://github.com/Brut-Security/CVE-2024-4879
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow
URL:https://github.com/Brut-Security/CVE-2024-4879
标签:#CVE-2024
GitHub
GitHub - Brut-Security/CVE-2024-4879: CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow
CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow - Brut-Security/CVE-2024-4879
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/1mpl3ment3d/CVE-2024-34102-RCE-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/1mpl3ment3d/CVE-2024-34102-RCE-POC
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability
URL:https://github.com/bigb0x/CVE-2024-4879
标签:#CVE-2024
更新了:CVE-2024
描述:Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability
URL:https://github.com/bigb0x/CVE-2024-4879
标签:#CVE-2024
GitHub
GitHub - bigb0x/CVE-2024-4879: Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability
Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability - bigb0x/CVE-2024-4879
GitHub监控消息提醒!!!
更新了:权限提升
描述:利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。
URL:https://github.com/314love/shiwu
标签:#权限提升
更新了:权限提升
描述:利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。
URL:https://github.com/314love/shiwu
标签:#权限提升
GitHub
GitHub - 314love/shiwu: 我主导开发了一个智能化的校园失物管理平台,采用SpringBoot+Vue框架实现前后端分离,后端技术包括SpringBoot、MyBatis-Plus、SpringMVC、SpringSecurity、…
我主导开发了一个智能化的校园失物管理平台,采用SpringBoot+Vue框架实现前后端分离,后端技术包括SpringBoot、MyBatis-Plus、SpringMVC、SpringSecurity、Redis、JWT和Java,前端使用Vue2.x、Element-UI、Axios、Vuex和VueRouter,数据库和服务器采用MySQL和Tomcat。该平台通过简洁干净的页面和快速...
GitHub监控消息提醒!!!
更新了:权限维持
描述:一款SSH批量改密,并持续监控的程序,可以实现改密时RCE,密码权限维持
URL:https://github.com/314love/wms
标签:#权限维持
更新了:权限维持
描述:一款SSH批量改密,并持续监控的程序,可以实现改密时RCE,密码权限维持
URL:https://github.com/314love/wms
标签:#权限维持
GitHub
GitHub - 314love/wms: 仓库管理系统(WMS)通过前后端分离架构实现高效管理,前端采用Vue.js和Element UI,提供注册登录、仓库和物品管理、出入库、维修、权限及系统管理等功能,通过Vue Router实现动态路由切换。后端基于Spring…
仓库管理系统(WMS)通过前后端分离架构实现高效管理,前端采用Vue.js和Element UI,提供注册登录、仓库和物品管理、出入库、维修、权限及系统管理等功能,通过Vue Router实现动态路由切换。后端基于Spring Boot,使用Spring MVC开发RESTful API,数据持久化采用MyBatisplus。设有超级管理员、管理员和普通用户三种角色,分别享有不同的权限,确保...
GitHub监控消息提醒!!!
更新了:RCE
描述:Dell Summer 2024 Project RCE
URL:https://github.com/manunicholasjacob/Unified-OS-Debugger
标签:#RCE
更新了:RCE
描述:Dell Summer 2024 Project RCE
URL:https://github.com/manunicholasjacob/Unified-OS-Debugger
标签:#RCE
GitHub
GitHub - manunicholasjacob/Unified-OS-Debugger: Dell Summer 2024 Project RCE
Dell Summer 2024 Project RCE. Contribute to manunicholasjacob/Unified-OS-Debugger development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:支持更多操作系统版本的SharpKatz,包括win7-win11、windows server2008-2022,使用内联assembly,从此告别免杀
URL:https://github.com/INotGreen/SharpKatz_pro
标签:#免杀
更新了:免杀
描述:支持更多操作系统版本的SharpKatz,包括win7-win11、windows server2008-2022,使用内联assembly,从此告别免杀
URL:https://github.com/INotGreen/SharpKatz_pro
标签:#免杀
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Detection method for Exim vulnerability CVE-2024-39929
URL:https://github.com/rxerium/CVE-2024-39929
标签:#CVE-2024
更新了:CVE-2024
描述:Detection method for Exim vulnerability CVE-2024-39929
URL:https://github.com/rxerium/CVE-2024-39929
标签:#CVE-2024
GitHub
GitHub - rxerium/CVE-2024-39929: Detection method for Exim vulnerability CVE-2024-39929
Detection method for Exim vulnerability CVE-2024-39929 - GitHub - rxerium/CVE-2024-39929: Detection method for Exim vulnerability CVE-2024-39929
GitHub监控消息提醒!!!
更新了:RCE
描述:SSTI Payload Generator for RCE
URL:https://github.com/fhAnso/ssti_payload_gen
标签:#RCE
更新了:RCE
描述:SSTI Payload Generator for RCE
URL:https://github.com/fhAnso/ssti_payload_gen
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Mass Exploit - CVE-2024-29824 - Ivanti EPM - Remote Code Execution (RCE)
URL:https://github.com/codeb0ss/CVE-2024-29824-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Mass Exploit - CVE-2024-29824 - Ivanti EPM - Remote Code Execution (RCE)
URL:https://github.com/codeb0ss/CVE-2024-29824-PoC
标签:#CVE-2024
GitHub
GitHub - codeb0ss/CVE-2024-29824-PoC: Mass Exploit - CVE-2024-29824 - Ivanti EPM - Remote Code Execution (RCE)
Mass Exploit - CVE-2024-29824 - Ivanti EPM - Remote Code Execution (RCE) - codeb0ss/CVE-2024-29824-PoC
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Mass Exploitation CVE-2024-34102
URL:https://github.com/bughuntar/CVE-2024-34102
标签:#CVE-2024
更新了:CVE-2024
描述:Mass Exploitation CVE-2024-34102
URL:https://github.com/bughuntar/CVE-2024-34102
标签:#CVE-2024
GitHub
GitHub - bughuntar/CVE-2024-34102: Exploitation CVE-2024-34102
Exploitation CVE-2024-34102. Contribute to bughuntar/CVE-2024-34102 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Mass Exploit - CVE-2024-20353 [Cisco] < Unauthenticated < Denial Of Service
URL:https://github.com/codeb0ss/CVE-2024-20353-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Mass Exploit - CVE-2024-20353 [Cisco] < Unauthenticated < Denial Of Service
URL:https://github.com/codeb0ss/CVE-2024-20353-PoC
标签:#CVE-2024
GitHub
GitHub - codeb0ss/CVE-2024-20353-PoC: Mass Exploit - CVE-2024-20353 [Cisco] < Unauthenticated < Denial Of Service
Mass Exploit - CVE-2024-20353 [Cisco] < Unauthenticated < Denial Of Service - codeb0ss/CVE-2024-20353-PoC
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34102 made Python code
URL:https://github.com/bughuntar/CVE-2024-34102-Python
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34102 made Python code
URL:https://github.com/bughuntar/CVE-2024-34102-Python
标签:#CVE-2024
GitHub
GitHub - bughuntar/CVE-2024-34102-Python: CVE-2024-34102 Exploiter based on Python
CVE-2024-34102 Exploiter based on Python. Contribute to bughuntar/CVE-2024-34102-Python development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd.
URL:https://github.com/liqhtnd/sshd-logingracetime0
标签:#CVE-2024
更新了:CVE-2024
描述:Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd.
URL:https://github.com/liqhtnd/sshd-logingracetime0
标签:#CVE-2024
GitHub
GitHub - liqhtnd/sshd-logingracetime0: Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd.
Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd. - liqhtnd/sshd-logingracetime0
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-39250 TimeTrax SQLi
URL:https://github.com/efrann/CVE-2024-39250
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-39250 TimeTrax SQLi
URL:https://github.com/efrann/CVE-2024-39250
标签:#CVE-2024
GitHub
GitHub - efrann/CVE-2024-39250: CVE-2024-39250 TimeTrax SQLi
CVE-2024-39250 TimeTrax SQLi. Contribute to efrann/CVE-2024-39250 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:OpenPetra v.2023.02 CVE-2024-40506
URL:https://github.com/Jansen-C-Moreira/CVE-2024-40506
标签:#CVE-2024
更新了:CVE-2024
描述:OpenPetra v.2023.02 CVE-2024-40506
URL:https://github.com/Jansen-C-Moreira/CVE-2024-40506
标签:#CVE-2024
GitHub
GitHub - Jansen-C-Moreira/CVE-2024-40506: OpenPetra v.2023.02 CVE-2024-40506
OpenPetra v.2023.02 CVE-2024-40506. Contribute to Jansen-C-Moreira/CVE-2024-40506 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:OpenPetra v.2023.02 Use CVE-2024-40507
URL:https://github.com/Jansen-C-Moreira/Use-CVE-2024-40507
标签:#CVE-2024
更新了:CVE-2024
描述:OpenPetra v.2023.02 Use CVE-2024-40507
URL:https://github.com/Jansen-C-Moreira/Use-CVE-2024-40507
标签:#CVE-2024
GitHub
GitHub - Jansen-C-Moreira/CVE-2024-40507: OpenPetra v.2023.02 Use CVE-2024-40507
OpenPetra v.2023.02 Use CVE-2024-40507. Contribute to Jansen-C-Moreira/CVE-2024-40507 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:OpenPetra v.2023.02 CVE-2024-40508
URL:https://github.com/Jansen-C-Moreira/CVE-2024-40508
标签:#CVE-2024
更新了:CVE-2024
描述:OpenPetra v.2023.02 CVE-2024-40508
URL:https://github.com/Jansen-C-Moreira/CVE-2024-40508
标签:#CVE-2024
GitHub
GitHub - Jansen-C-Moreira/CVE-2024-40508: OpenPetra v.2023.02 CVE-2024-40508
OpenPetra v.2023.02 CVE-2024-40508. Contribute to Jansen-C-Moreira/CVE-2024-40508 development by creating an account on GitHub.