GitHub监控消息提醒!!!
更新了:免杀
描述:一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
URL:https://github.com/jerryy2577/jd_scripts
标签:#免杀
更新了:免杀
描述:一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
URL:https://github.com/jerryy2577/jd_scripts
标签:#免杀
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.
URL:https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.
URL:https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
标签:#CVE-2024
GitHub
GitHub - Marven11/CVE-2024-28397-js2py-Sandbox-Escape: CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.
CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction. - Marven11/CVE-2024-28397-js2py-Sandbox-Escape
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2023-4220 POC RCE
URL:https://github.com/insomnia-jacob/CVE-2023-4220
标签:#RCE
更新了:RCE
描述:CVE-2023-4220 POC RCE
URL:https://github.com/insomnia-jacob/CVE-2023-4220
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for CVE-2024-34144
URL:https://github.com/MXWXZ/CVE-2024-34144
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for CVE-2024-34144
URL:https://github.com/MXWXZ/CVE-2024-34144
标签:#CVE-2024
GitHub
GitHub - MXWXZ/CVE-2024-34144: PoC for CVE-2024-34144
PoC for CVE-2024-34144. Contribute to MXWXZ/CVE-2024-34144 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC to test CVE-2024-39929 against EXIM mail servers
URL:https://github.com/michael-david-fry/CVE-2024-39929
标签:#CVE-2024
更新了:CVE-2024
描述:POC to test CVE-2024-39929 against EXIM mail servers
URL:https://github.com/michael-david-fry/CVE-2024-39929
标签:#CVE-2024
GitHub
GitHub - michael-david-fry/CVE-2024-39929: POC to test CVE-2024-39929 against EXIM mail servers
POC to test CVE-2024-39929 against EXIM mail servers - michael-david-fry/CVE-2024-39929
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-21006 exp
URL:https://github.com/lightr3d/CVE-2024-21006_jar
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-21006 exp
URL:https://github.com/lightr3d/CVE-2024-21006_jar
标签:#CVE-2024
GitHub
GitHub - lightr3d/CVE-2024-21006_jar: CVE-2024-21006 exp
CVE-2024-21006 exp. Contribute to lightr3d/CVE-2024-21006_jar development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/etx-Arn/CVE-2024-34102-RCE
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/etx-Arn/CVE-2024-34102-RCE
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/suifei/fridare
标签:#绕过
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/suifei/fridare
标签:#绕过
GitHub
GitHub - suifei/fridare: 强大的 Frida 重打包工具,用于 iOS 和 Android。轻松修改 Frida 特征,增强隐蔽性,绕过检测。简化逆向工程和安全测试。Powerful Frida repackaging tool…
强大的 Frida 重打包工具,用于 iOS 和 Android。轻松修改 Frida 特征,增强隐蔽性,绕过检测。简化逆向工程和安全测试。Powerful Frida repackaging tool for iOS and Android. Easily modify Frida servers to enhance stealth and bypass detection. Strea...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Mass Exploit < [CVE-2024-7188 - Bylancer Quicklancer] - SQL Injection
URL:https://github.com/codeb0ss/CVE-2024-7188-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Mass Exploit < [CVE-2024-7188 - Bylancer Quicklancer] - SQL Injection
URL:https://github.com/codeb0ss/CVE-2024-7188-PoC
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof of concept to exploit CVE-2024-40617
URL:https://github.com/KyssK00L/CVE-2024-40617
标签:#CVE-2024
更新了:CVE-2024
描述:Proof of concept to exploit CVE-2024-40617
URL:https://github.com/KyssK00L/CVE-2024-40617
标签:#CVE-2024
GitHub
GitHub - KyssK00L/CVE-2024-40617: CVE-2024-40617 Exploit PoC
CVE-2024-40617 Exploit PoC. Contribute to KyssK00L/CVE-2024-40617 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-6738...
URL:https://github.com/XD3an/CVE-2024-6738
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-6738...
URL:https://github.com/XD3an/CVE-2024-6738
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC of CVE-2024-32002 - Remote Code Execution while cloning special-crafted local repositories
URL:https://github.com/NishanthAnand21/CVE-2024-32002-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:PoC of CVE-2024-32002 - Remote Code Execution while cloning special-crafted local repositories
URL:https://github.com/NishanthAnand21/CVE-2024-32002-PoC
标签:#CVE-2024
GitHub
GitHub - NishanthAnand21/CVE-2024-32002-PoC: PoC of CVE-2024-32002 - Remote Code Execution while cloning special-crafted local…
PoC of CVE-2024-32002 - Remote Code Execution while cloning special-crafted local repositories - NishanthAnand21/CVE-2024-32002-PoC
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Just small script to exploit CVE-2024-32002
URL:https://github.com/tiyeume25112004/CVE-2024-32002
标签:#CVE-2024
更新了:CVE-2024
描述:Just small script to exploit CVE-2024-32002
URL:https://github.com/tiyeume25112004/CVE-2024-32002
标签:#CVE-2024
GitHub
GitHub - SpycioKon/CVE-2024-32002: Just small script to exploit CVE-2024-32002
Just small script to exploit CVE-2024-32002. Contribute to SpycioKon/CVE-2024-32002 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-39700 Proof of Concept
URL:https://github.com/LOURC0D3/CVE-2024-39700-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-39700 Proof of Concept
URL:https://github.com/LOURC0D3/CVE-2024-39700-PoC
标签:#CVE-2024
GitHub
GitHub - LOURC0D3/CVE-2024-39700-PoC: CVE-2024-39700 Proof of Concept
CVE-2024-39700 Proof of Concept. Contribute to LOURC0D3/CVE-2024-39700-PoC development by creating an account on GitHub.
👍1