GitHub监控消息提醒!!!
更新了:免杀
描述:免杀技术交流群:https://t.me/jlsafe
URL:https://github.com/huangxy7/jd_scripts
标签:#免杀
更新了:免杀
描述:免杀技术交流群:https://t.me/jlsafe
URL:https://github.com/huangxy7/jd_scripts
标签:#免杀
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This repository provides a workaround preventing exploitation of SECURITY-3430 / CVE-2024-43044
URL:https://github.com/jenkinsci-cert/SECURITY-3430
标签:#CVE-2024
更新了:CVE-2024
描述:This repository provides a workaround preventing exploitation of SECURITY-3430 / CVE-2024-43044
URL:https://github.com/jenkinsci-cert/SECURITY-3430
标签:#CVE-2024
GitHub
GitHub - jenkinsci-cert/SECURITY-3430: This repository provides a workaround preventing exploitation of SECURITY-3430 / CVE-2024…
This repository provides a workaround preventing exploitation of SECURITY-3430 / CVE-2024-43044 - jenkinsci-cert/SECURITY-3430
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Exploit POC for CVE-2024-36877
URL:https://github.com/jjensn/CVE-2024-36877
标签:#CVE-2024
更新了:CVE-2024
描述:Exploit POC for CVE-2024-36877
URL:https://github.com/jjensn/CVE-2024-36877
标签:#CVE-2024
GitHub
GitHub - jjensn/CVE-2024-36877: Exploit POC for CVE-2024-36877
Exploit POC for CVE-2024-36877. Contribute to jjensn/CVE-2024-36877 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:SpringBoot 漏洞扫描利用工具,默认优先使用收集路径进行扫描(springboot_urls.txt) 当扫描不存在接口时,使用api前缀拼接扫描,可以自行添加
URL:https://github.com/Muhansrc/springboot_scan
标签:#漏洞利用
更新了:漏洞利用
描述:SpringBoot 漏洞扫描利用工具,默认优先使用收集路径进行扫描(springboot_urls.txt) 当扫描不存在接口时,使用api前缀拼接扫描,可以自行添加
URL:https://github.com/Muhansrc/springboot_scan
标签:#漏洞利用
GitHub
GitHub - doki-byte/springboot_scan: SpringBoot 漏洞扫描利用工具,默认优先使用收集路径进行扫描(springboot_urls.txt) 当扫描不存在接口时,使用api前缀拼接扫描,可以自行添加
SpringBoot 漏洞扫描利用工具,默认优先使用收集路径进行扫描(springboot_urls.txt) 当扫描不存在接口时,使用api前缀拼接扫描,可以自行添加 - doki-byte/springboot_scan
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This is my exploit for CVE-2024-22120, which involves an SSRF vulnerability inside an XXE with a Gopher payload.
URL:https://github.com/g4nkd/CVE-2024-22120-RCE-with-gopher
标签:#CVE-2024
更新了:CVE-2024
描述:This is my exploit for CVE-2024-22120, which involves an SSRF vulnerability inside an XXE with a Gopher payload.
URL:https://github.com/g4nkd/CVE-2024-22120-RCE-with-gopher
标签:#CVE-2024
GitHub
GitHub - g4nkd/CVE-2024-22120-RCE-with-gopher: This exploit was created to exploit an XXE (XML External Entity). Through it, I…
This exploit was created to exploit an XXE (XML External Entity). Through it, I read the backend code of the web service and found an endpoint where I could use gopher to make internal requests on ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Perform With Massive Apache OFBiz Zero-Day Scanner & RCE
URL:https://github.com/ThatNotEasy/CVE-2024-38856
标签:#CVE-2024
更新了:CVE-2024
描述:Perform With Massive Apache OFBiz Zero-Day Scanner & RCE
URL:https://github.com/ThatNotEasy/CVE-2024-38856
标签:#CVE-2024
GitHub
GitHub - ThatNotEasy/CVE-2024-38856: Perform With Massive Apache OFBiz Zero-Day Scanner & RCE
Perform With Massive Apache OFBiz Zero-Day Scanner & RCE - ThatNotEasy/CVE-2024-38856
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:基于135端口检测目标是否存在CVE-2024-38077漏洞
URL:https://github.com/BambiZombie/CVE-2024-38077_check
标签:#CVE-2024
更新了:CVE-2024
描述:基于135端口检测目标是否存在CVE-2024-38077漏洞
URL:https://github.com/BambiZombie/CVE-2024-38077_check
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:基于135端口检测目标是否存在CVE-2024-38077漏洞
URL:https://github.com/BambiZombie/CVE-2024-38077-check
标签:#CVE-2024
更新了:CVE-2024
描述:基于135端口检测目标是否存在CVE-2024-38077漏洞
URL:https://github.com/BambiZombie/CVE-2024-38077-check
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:2345-Input-method-Software_Insecure-configuration-RCE
URL:https://github.com/AabyssZG/2345-Input-method-Software_Insecure-configuration-RCE
标签:#RCE
更新了:RCE
描述:2345-Input-method-Software_Insecure-configuration-RCE
URL:https://github.com/AabyssZG/2345-Input-method-Software_Insecure-configuration-RCE
标签:#RCE
GitHub
GitHub - AabyssZG/2345-Input-method-Software_Insecure-configuration-RCE: 2345-Input-method-Software_Insecure-configuration-RCE
2345-Input-method-Software_Insecure-configuration-RCE - AabyssZG/2345-Input-method-Software_Insecure-configuration-RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:A PoC Exploit for CVE-2024-3105 - The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress Remote Code Execution (RCE)
URL:https://github.com/hunThubSpace/CVE-2024-3105-PoC
标签:#RCE
更新了:RCE
描述:A PoC Exploit for CVE-2024-3105 - The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress Remote Code Execution (RCE)
URL:https://github.com/hunThubSpace/CVE-2024-3105-PoC
标签:#RCE
GitHub
GitHub - hunThubSpace/CVE-2024-3105-PoC: A PoC Exploit for CVE-2024-3105 - The Woody code snippets – Insert Header Footer Code…
A PoC Exploit for CVE-2024-3105 - The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress Remote Code Execution (RCE) - hunThubSpace/CVE-2024-3105-PoC
GitHub监控消息提醒!!!
更新了:渗透测试
描述:python黑帽子-黑客与渗透测试编程之道
URL:https://github.com/maplebell/python_test
标签:#渗透测试
更新了:渗透测试
描述:python黑帽子-黑客与渗透测试编程之道
URL:https://github.com/maplebell/python_test
标签:#渗透测试
GitHub
GitHub - maplebell/python_test: python黑帽子-黑客与渗透测试编程之道
python黑帽子-黑客与渗透测试编程之道. Contribute to maplebell/python_test development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Docker Deskop giving issue CVE-2024-26308 for maven [reproduce]
URL:https://github.com/crazycatMyopic/cve
标签:#CVE-2024
更新了:CVE-2024
描述:Docker Deskop giving issue CVE-2024-26308 for maven [reproduce]
URL:https://github.com/crazycatMyopic/cve
标签:#CVE-2024
GitHub
GitHub - crazycatMyopic/cve: Docker Deskop giving issue CVE-2024-26308 for maven [reproduce]
Docker Deskop giving issue CVE-2024-26308 for maven [reproduce] - crazycatMyopic/cve
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information #RCE #python3
URL:https://github.com/Pypi-Project/RCity-CVE-2024-27198
标签:#RCE
更新了:RCE
描述:CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information #RCE #python3
URL:https://github.com/Pypi-Project/RCity-CVE-2024-27198
标签:#RCE
GitHub监控消息提醒!!!
更新了:信息收集
描述:信息收集工具 对目标机器上的文档进行收集并打包
URL:https://github.com/simonlee-hello/FuckDoc
标签:#信息收集
更新了:信息收集
描述:信息收集工具 对目标机器上的文档进行收集并打包
URL:https://github.com/simonlee-hello/FuckDoc
标签:#信息收集
GitHub
GitHub - simonlee-hello/FuckDoc: 信息收集工具 对目标机器上的文档进行收集并打包
信息收集工具 对目标机器上的文档进行收集并打包. Contribute to simonlee-hello/FuckDoc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH.
URL:https://github.com/niktoproject/CVE-202406387_Check.py
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH.
URL:https://github.com/niktoproject/CVE-202406387_Check.py
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:WonderCMS RCE CVE-2023-41425
URL:https://github.com/insomnia-jacob/CVE-2023-41425
标签:#RCE
更新了:RCE
描述:WonderCMS RCE CVE-2023-41425
URL:https://github.com/insomnia-jacob/CVE-2023-41425
标签:#RCE
GitHub
GitHub - insomnia-jacob/CVE-2023-41425
Contribute to insomnia-jacob/CVE-2023-41425 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内网渗透
描述:内网渗透过程中搜寻指定文件内容,从而找到突破口的一个小工具
URL:https://github.com/AabyssZG/FindEverything
标签:#内网渗透
更新了:内网渗透
描述:内网渗透过程中搜寻指定文件内容,从而找到突破口的一个小工具
URL:https://github.com/AabyssZG/FindEverything
标签:#内网渗透
GitHub
GitHub - AabyssZG/FindEverything: 内网渗透过程中搜寻指定文件内容,从而找到突破口的一个小工具
内网渗透过程中搜寻指定文件内容,从而找到突破口的一个小工具. Contribute to AabyssZG/FindEverything development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:信息收集工具 对目标机器上的文档进行收集并打包
URL:https://github.com/Noob-0-GitHub/TrafficTracker
标签:#信息收集
更新了:信息收集
描述:信息收集工具 对目标机器上的文档进行收集并打包
URL:https://github.com/Noob-0-GitHub/TrafficTracker
标签:#信息收集
GitHub
GitHub - Noob-0-GitHub/TrafficTracker: A traffic tracker based on the clash network subscribe protocol, periodically collecting…
A traffic tracker based on the clash network subscribe protocol, periodically collecting traffic information and display by web (based on Flask and Chart.js), helps to keep track of the proxy traff...