GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Tactics and Techniques
URL:https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
更新了:Red Team
描述:Red Teaming Tactics and Techniques
URL:https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
GitHub
GitHub - mantvydasb/RedTeaming-Tactics-and-Techniques: Red Teaming Tactics and Techniques
Red Teaming Tactics and Techniques. Contribute to mantvydasb/RedTeaming-Tactics-and-Techniques development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Exploit
描述:CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin.
URL:https://github.com/wolf0x/HiveNightmare
更新了:Exploit
描述:CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin.
URL:https://github.com/wolf0x/HiveNightmare
GitHub
GitHub - wolf0x/HiveNightmare: CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin.
CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin. - wolf0x/HiveNightmare
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploits that I modified according to my need/usecase .
URL:https://github.com/A3h1nt/Exploits
更新了:Exploit
描述:Exploits that I modified according to my need/usecase .
URL:https://github.com/A3h1nt/Exploits
GitHub
GitHub - A3h1nt/Exploits: Exploits that I modified according to my need/usecase .
Exploits that I modified according to my need/usecase . - GitHub - A3h1nt/Exploits: Exploits that I modified according to my need/usecase .
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:C# PoC for CVE-2021-36934/HiveNightmare/SeriousSAM
URL:https://github.com/cube0x0/CVE-2021-36934
更新了:CVE-2021
描述:C# PoC for CVE-2021-36934/HiveNightmare/SeriousSAM
URL:https://github.com/cube0x0/CVE-2021-36934
GitHub监控消息提醒!!!
更新了:Exploit
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/HuskyHacks/ShadowSteal
更新了:Exploit
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/HuskyHacks/ShadowSteal
GitHub
GitHub - HuskyHacks/ShadowSteal: Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation - HuskyHacks/ShadowSteal
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploits project Hacking Command Center
URL:https://github.com/chacka0101/exploits
更新了:Exploit
描述:Exploits project Hacking Command Center
URL:https://github.com/chacka0101/exploits
GitHub
GitHub - chacka0101/exploits: Exploits project Hacking Command Center
Exploits project Hacking Command Center. Contribute to chacka0101/exploits development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/jmaddington/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM
更新了:CVE-2021
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/jmaddington/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM
GitHub
GitHub - jmaddington/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM: This PowerShell script will take the mitigation measures…
This PowerShell script will take the mitigation measures for CVE-2021-36934 described by Microsoft and the US CERT team. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36934 https:...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Penetration Testing, Red Teaming, Bug Bounty, CTF Write-ups
URL:https://github.com/4t0ys3d/4t0ys3d.github.io
更新了:Red Team
描述:Penetration Testing, Red Teaming, Bug Bounty, CTF Write-ups
URL:https://github.com/4t0ys3d/4t0ys3d.github.io
GitHub
GitHub - 4t0ys3d/4t0ys3d.github.io: Penetration Testing, Red Teaming, Bug Bounty, CTF Write-ups
Penetration Testing, Red Teaming, Bug Bounty, CTF Write-ups - 4t0ys3d/4t0ys3d.github.io
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploit development and reversing of Hichip's P2P camera firmware
URL:https://github.com/0xedh/hichip-p2p-firmware-rce
更新了:Exploit
描述:Exploit development and reversing of Hichip's P2P camera firmware
URL:https://github.com/0xedh/hichip-p2p-firmware-rce
GitHub
GitHub - 0xedh/hichip-p2p-firmware-rce: Exploit development and reversing of Hichip's P2P camera firmware
Exploit development and reversing of Hichip's P2P camera firmware - 0xedh/hichip-p2p-firmware-rce
GitHub监控消息提醒!!!
更新了:Exploit
描述:Bcrypt Cracker & Exploitation Toolkit.
URL:https://github.com/duckstroms/poll-bcrypt
更新了:Exploit
描述:Bcrypt Cracker & Exploitation Toolkit.
URL:https://github.com/duckstroms/poll-bcrypt
GitHub
GitHub - duckstroms/poll-bcrypt: Bcrypt Cracker & Exploitation Toolkit.
Bcrypt Cracker & Exploitation Toolkit. Contribute to duckstroms/poll-bcrypt development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Exploit
描述:eLearnSecurity Certified Exploit Development
URL:https://github.com/CyberSecurityUP/eCXD-Preparation
更新了:Exploit
描述:eLearnSecurity Certified Exploit Development
URL:https://github.com/CyberSecurityUP/eCXD-Preparation
GitHub
GitHub - JoasASantos/eCXD-Preparation: eLearnSecurity Certified Exploit Development
eLearnSecurity Certified Exploit Development. Contribute to JoasASantos/eCXD-Preparation development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing vulnerable functions during runtime
URL:https://github.com/baerwolf/cve-2021-33909
更新了:CVE-2021
描述:This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing vulnerable functions during runtime
URL:https://github.com/baerwolf/cve-2021-33909
GitHub
GitHub - baerwolf/cve-2021-33909: This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing…
This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing vulnerable functions during runtime - GitHub - baerwolf/cve-2021-33909: This module fixes an issue in...
GitHub监控消息提醒!!!
更新了:Exploit
描述:Repository for _Exploiting BERT For Multimodal Target Sentiment Classification Through Input Space Translation_
URL:https://github.com/codezakh/exploiting-BERT-thru-translation
更新了:Exploit
描述:Repository for _Exploiting BERT For Multimodal Target Sentiment Classification Through Input Space Translation_
URL:https://github.com/codezakh/exploiting-BERT-thru-translation
GitHub
GitHub - codezakh/exploiting-BERT-thru-translation: Repository for "Exploiting BERT For Multimodal Target Sentiment Classification…
Repository for "Exploiting BERT For Multimodal Target Sentiment Classification Through Input Space Translation" [ACM MM '21] - GitHub - codezakh/exploiting-BERT-thru-trans...
GitHub监控消息提醒!!!
更新了:Exploit
描述:PS4 7.5X Host Exploit (Reduce sleeps in jb.c to speed up)
URL:https://github.com/Night-King-Host/75XV3b2
更新了:Exploit
描述:PS4 7.5X Host Exploit (Reduce sleeps in jb.c to speed up)
URL:https://github.com/Night-King-Host/75XV3b2
GitHub
GitHub - Night-King-Host/75XV3b2: PS4 7.5X Host Exploit (Reduce sleeps in jb.c to speed up)
PS4 7.5X Host Exploit (Reduce sleeps in jb.c to speed up) - GitHub - Night-King-Host/75XV3b2: PS4 7.5X Host Exploit (Reduce sleeps in jb.c to speed up)
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Exploit code for CVE-2021-33909,Just a dump of removed https://github.com/AmIAHuman/ repo
URL:https://github.com/bbinfosec43/CVE-2021-33909
更新了:CVE-2021
描述:Exploit code for CVE-2021-33909,Just a dump of removed https://github.com/AmIAHuman/ repo
URL:https://github.com/bbinfosec43/CVE-2021-33909
GitHub
AmIAHuman - Overview
ahhhhhhhhhhhhhhhhhhhhhhhh. AmIAHuman has 6 repositories available. Follow their code on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:WEB安全手册,漏洞理解,漏洞利用总结。【持续更新】
URL:https://github.com/Anonymous-ghost/AttackWebFrameworkTools
更新了:漏洞利用
描述:WEB安全手册,漏洞理解,漏洞利用总结。【持续更新】
URL:https://github.com/Anonymous-ghost/AttackWebFrameworkTools
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-35448 (Remote Mouse GUI 3.008 - Local Privilege Escalation)
URL:https://github.com/deathflash1411/CVE-2021-35448
更新了:CVE-2021
描述:CVE-2021-35448 (Remote Mouse GUI 3.008 - Local Privilege Escalation)
URL:https://github.com/deathflash1411/CVE-2021-35448
GitHub
GitHub - deathflash1411/CVE-2021-35448: Remote Mouse GUI 3.008 - Local Privilege Escalation
Remote Mouse GUI 3.008 - Local Privilege Escalation - GitHub - deathflash1411/CVE-2021-35448: Remote Mouse GUI 3.008 - Local Privilege Escalation
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack
URL:https://github.com/lhashashinl/CVE-2021-37152
更新了:Exploit
描述:Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack
URL:https://github.com/lhashashinl/CVE-2021-37152
GitHub
lhashashinl/ttt
Contribute to lhashashinl/ttt development by creating an account on GitHub.