GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Automated Gitlab RCE via CVE-2021-22205
URL:https://github.com/X1pe0/Automated-Gitlab-RCE
更新了:CVE-2021
描述:Automated Gitlab RCE via CVE-2021-22205
URL:https://github.com/X1pe0/Automated-Gitlab-RCE
GitHub
GitHub - X1pe0/Automated-Gitlab-RCE: Automated Gitlab RCE via CVE-2021-22205
Automated Gitlab RCE via CVE-2021-22205. Contribute to X1pe0/Automated-Gitlab-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution
URL:https://github.com/runsel/GitLab-CVE-2021-22205-
更新了:CVE-2021
描述:Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution
URL:https://github.com/runsel/GitLab-CVE-2021-22205-
GitHub
GitHub - runsel/GitLab-CVE-2021-22205-: Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution
Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution - runsel/GitLab-CVE-2021-22205-
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Random Cobalt Strike Aggressor scripts
URL:https://github.com/fitzgeralddaniel/aggressor_scripts
更新了:Cobalt Strike
描述:Random Cobalt Strike Aggressor scripts
URL:https://github.com/fitzgeralddaniel/aggressor_scripts
GitHub
GitHub - fitzgeralddaniel/aggressor_scripts: Random Cobalt Strike Aggressor scripts
Random Cobalt Strike Aggressor scripts. Contribute to fitzgeralddaniel/aggressor_scripts development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Compiled binaries and ready code for Red Teaming
URL:https://github.com/cepxeo/redteambins
更新了:Red Team
描述:Compiled binaries and ready code for Red Teaming
URL:https://github.com/cepxeo/redteambins
GitHub
GitHub - cepxeo/redteambins: Compiled binaries and ready code for Red Teaming
Compiled binaries and ready code for Red Teaming. Contribute to cepxeo/redteambins development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object
URL:https://github.com/splunk/melting-cobalt
更新了:Cobalt Strike
描述:A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object
URL:https://github.com/splunk/melting-cobalt
GitHub
GitHub - splunk/melting-cobalt: A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object
A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object - splunk/melting-cobalt
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online portal system.
URL:https://github.com/TheHackingRabbi/CVE-2021-42665
更新了:CVE-2021
描述:CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online portal system.
URL:https://github.com/TheHackingRabbi/CVE-2021-42665
GitHub
GitHub - TheHackingRabbi/CVE-2021-42665: CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online…
CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online portal system. - GitHub - TheHackingRabbi/CVE-2021-42665: CVE-2021-42665 - SQL Injection authentication b...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.
URL:https://github.com/TheHackingRabbi/CVE-2021-42669
更新了:CVE-2021
描述:CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.
URL:https://github.com/TheHackingRabbi/CVE-2021-42669
GitHub
GitHub - TheHackingRabbi/CVE-2021-42669: CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the…
CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system. - GitHub - TheHackingRabbi/CVE-2021-42669: CVE-2021-42669 - Remote code exec...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system.
URL:https://github.com/TheHackingRabbi/CVE-2021-42671
更新了:CVE-2021
描述:CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system.
URL:https://github.com/TheHackingRabbi/CVE-2021-42671
GitHub
GitHub - 0xDeku/CVE-2021-42671: CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system.
CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system. - GitHub - 0xDeku/CVE-2021-42671: CVE-2021-42671 - Broken access control vulnerability in the Engineers ...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574
URL:https://github.com/maweil/bidi_char_detector
更新了:CVE-2021
描述:Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574
URL:https://github.com/maweil/bidi_char_detector
GitHub
GitHub - maweil/bidi_char_detector: Checks your files for existence of Unicode BIDI characters which can be misused for supply…
Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 - maweil/bidi_char_detector
GitHub监控消息提醒!!!
更新了:免杀
描述:bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题
URL:https://github.com/sairson/MateuszEx
更新了:免杀
描述:bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题
URL:https://github.com/sairson/MateuszEx
GitHub
GitHub - sairson/MateuszEx: bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题
bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题. Contribute to sairson/MateuszEx development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team vs. Blue Team scenario in which we will play the role of both Pen Tester and SOC analyst.
URL:https://github.com/Diablo5G/Red-vs-Blue-Project
更新了:Red Team
描述:Red Team vs. Blue Team scenario in which we will play the role of both Pen Tester and SOC analyst.
URL:https://github.com/Diablo5G/Red-vs-Blue-Project
GitHub
GitHub - Diablo5G/Red-vs-Blue-Project: Red Team vs. Blue Team scenario in which we will play the role of both Pen Tester and SOC…
Red Team vs. Blue Team scenario in which we will play the role of both Pen Tester and SOC analyst. - GitHub - Diablo5G/Red-vs-Blue-Project: Red Team vs. Blue Team scenario in which we will play the...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Exploit for CVE-2021-40449
URL:https://github.com/Kristal-g/CVE-2021-40449_poc
更新了:CVE-2021
描述:Exploit for CVE-2021-40449
URL:https://github.com/Kristal-g/CVE-2021-40449_poc
GitHub
GitHub - Kristal-g/CVE-2021-40449_poc: Exploit for CVE-2021-40449
Exploit for CVE-2021-40449. Contribute to Kristal-g/CVE-2021-40449_poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Assessment Common Scoring System
URL:https://github.com/wevertonribeiroferreira/Red-vs-Blue-Project
更新了:Red Team
描述:Red Teaming Assessment Common Scoring System
URL:https://github.com/wevertonribeiroferreira/Red-vs-Blue-Project
GitHub
GitHub - wevertonribeiroferreira/Red-vs-Blue-Project: I concluded this report with a imersive and very hand-on assesement where…
I concluded this report with a imersive and very hand-on assesement where I was able to use the tactics and tools available as a Red team player giving me a better understading of how data exploit...
GitHub监控消息提醒!!!
更新了:免杀
描述:结合反射调用、Javac动态编译、ScriptEngine调用JS技术和各种代码混淆技巧的一款免杀JSP Webshell生成工具
URL:https://github.com/EmYiQing/JSPHorse
更新了:免杀
描述:结合反射调用、Javac动态编译、ScriptEngine调用JS技术和各种代码混淆技巧的一款免杀JSP Webshell生成工具
URL:https://github.com/EmYiQing/JSPHorse
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:HAProxy CVE-2021-40346
URL:https://github.com/Vulnmachines/HAProxy_CVE-2021-40346
更新了:CVE-2021
描述:HAProxy CVE-2021-40346
URL:https://github.com/Vulnmachines/HAProxy_CVE-2021-40346
GitHub
GitHub - Vulnmachines/HAProxy_CVE-2021-40346: HAProxy CVE-2021-40346
HAProxy CVE-2021-40346. Contribute to Vulnmachines/HAProxy_CVE-2021-40346 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A sample POC for CVE-2021-30657 affecting MacOS
URL:https://github.com/shubham0d/CVE-2021-30657
更新了:CVE-2021
描述:A sample POC for CVE-2021-30657 affecting MacOS
URL:https://github.com/shubham0d/CVE-2021-30657
GitHub
GitHub - shubham0d/CVE-2021-30657: A sample POC for CVE-2021-30657 affecting MacOS
A sample POC for CVE-2021-30657 affecting MacOS. Contribute to shubham0d/CVE-2021-30657 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Compiled binaries and ready code for Red Teaming
URL:https://github.com/smgannon443/RvB_Project
更新了:Red Team
描述:Compiled binaries and ready code for Red Teaming
URL:https://github.com/smgannon443/RvB_Project
GitHub
GitHub - smgannon443/RvB_Project: Worked as part of a small team to investigate and attack a capstone server. As the Red Team,…
Worked as part of a small team to investigate and attack a capstone server. As the Red Team, we exploited weaknesses in the server to eventual upload and lauch a PHP reverse shell that gained us ro...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:ETS5 Password Recovery Tool is a PoC for CVE-2021-36799
URL:https://github.com/robertguetzkow/ets5-password-recovery
更新了:CVE-2021
描述:ETS5 Password Recovery Tool is a PoC for CVE-2021-36799
URL:https://github.com/robertguetzkow/ets5-password-recovery
GitHub
GitHub - robertguetzkow/ets5-password-recovery: ETS5 Password Recovery Tool is a PoC for CVE-2021-36799
ETS5 Password Recovery Tool is a PoC for CVE-2021-36799 - robertguetzkow/ets5-password-recovery