GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.
URL:https://github.com/TheHackingRabbi/CVE-2021-42669
更新了:CVE-2021
描述:CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.
URL:https://github.com/TheHackingRabbi/CVE-2021-42669
GitHub
GitHub - TheHackingRabbi/CVE-2021-42669: CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the…
CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system. - GitHub - TheHackingRabbi/CVE-2021-42669: CVE-2021-42669 - Remote code exec...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system.
URL:https://github.com/TheHackingRabbi/CVE-2021-42671
更新了:CVE-2021
描述:CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system.
URL:https://github.com/TheHackingRabbi/CVE-2021-42671
GitHub
GitHub - 0xDeku/CVE-2021-42671: CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system.
CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system. - GitHub - 0xDeku/CVE-2021-42671: CVE-2021-42671 - Broken access control vulnerability in the Engineers ...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574
URL:https://github.com/maweil/bidi_char_detector
更新了:CVE-2021
描述:Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574
URL:https://github.com/maweil/bidi_char_detector
GitHub
GitHub - maweil/bidi_char_detector: Checks your files for existence of Unicode BIDI characters which can be misused for supply…
Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 - maweil/bidi_char_detector
GitHub监控消息提醒!!!
更新了:免杀
描述:bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题
URL:https://github.com/sairson/MateuszEx
更新了:免杀
描述:bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题
URL:https://github.com/sairson/MateuszEx
GitHub
GitHub - sairson/MateuszEx: bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题
bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题. Contribute to sairson/MateuszEx development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team vs. Blue Team scenario in which we will play the role of both Pen Tester and SOC analyst.
URL:https://github.com/Diablo5G/Red-vs-Blue-Project
更新了:Red Team
描述:Red Team vs. Blue Team scenario in which we will play the role of both Pen Tester and SOC analyst.
URL:https://github.com/Diablo5G/Red-vs-Blue-Project
GitHub
GitHub - Diablo5G/Red-vs-Blue-Project: Red Team vs. Blue Team scenario in which we will play the role of both Pen Tester and SOC…
Red Team vs. Blue Team scenario in which we will play the role of both Pen Tester and SOC analyst. - GitHub - Diablo5G/Red-vs-Blue-Project: Red Team vs. Blue Team scenario in which we will play the...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Exploit for CVE-2021-40449
URL:https://github.com/Kristal-g/CVE-2021-40449_poc
更新了:CVE-2021
描述:Exploit for CVE-2021-40449
URL:https://github.com/Kristal-g/CVE-2021-40449_poc
GitHub
GitHub - Kristal-g/CVE-2021-40449_poc: Exploit for CVE-2021-40449
Exploit for CVE-2021-40449. Contribute to Kristal-g/CVE-2021-40449_poc development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Assessment Common Scoring System
URL:https://github.com/wevertonribeiroferreira/Red-vs-Blue-Project
更新了:Red Team
描述:Red Teaming Assessment Common Scoring System
URL:https://github.com/wevertonribeiroferreira/Red-vs-Blue-Project
GitHub
GitHub - wevertonribeiroferreira/Red-vs-Blue-Project: I concluded this report with a imersive and very hand-on assesement where…
I concluded this report with a imersive and very hand-on assesement where I was able to use the tactics and tools available as a Red team player giving me a better understading of how data exploit...
GitHub监控消息提醒!!!
更新了:免杀
描述:结合反射调用、Javac动态编译、ScriptEngine调用JS技术和各种代码混淆技巧的一款免杀JSP Webshell生成工具
URL:https://github.com/EmYiQing/JSPHorse
更新了:免杀
描述:结合反射调用、Javac动态编译、ScriptEngine调用JS技术和各种代码混淆技巧的一款免杀JSP Webshell生成工具
URL:https://github.com/EmYiQing/JSPHorse
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:HAProxy CVE-2021-40346
URL:https://github.com/Vulnmachines/HAProxy_CVE-2021-40346
更新了:CVE-2021
描述:HAProxy CVE-2021-40346
URL:https://github.com/Vulnmachines/HAProxy_CVE-2021-40346
GitHub
GitHub - Vulnmachines/HAProxy_CVE-2021-40346: HAProxy CVE-2021-40346
HAProxy CVE-2021-40346. Contribute to Vulnmachines/HAProxy_CVE-2021-40346 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A sample POC for CVE-2021-30657 affecting MacOS
URL:https://github.com/shubham0d/CVE-2021-30657
更新了:CVE-2021
描述:A sample POC for CVE-2021-30657 affecting MacOS
URL:https://github.com/shubham0d/CVE-2021-30657
GitHub
GitHub - shubham0d/CVE-2021-30657: A sample POC for CVE-2021-30657 affecting MacOS
A sample POC for CVE-2021-30657 affecting MacOS. Contribute to shubham0d/CVE-2021-30657 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Compiled binaries and ready code for Red Teaming
URL:https://github.com/smgannon443/RvB_Project
更新了:Red Team
描述:Compiled binaries and ready code for Red Teaming
URL:https://github.com/smgannon443/RvB_Project
GitHub
GitHub - smgannon443/RvB_Project: Worked as part of a small team to investigate and attack a capstone server. As the Red Team,…
Worked as part of a small team to investigate and attack a capstone server. As the Red Team, we exploited weaknesses in the server to eventual upload and lauch a PHP reverse shell that gained us ro...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:ETS5 Password Recovery Tool is a PoC for CVE-2021-36799
URL:https://github.com/robertguetzkow/ets5-password-recovery
更新了:CVE-2021
描述:ETS5 Password Recovery Tool is a PoC for CVE-2021-36799
URL:https://github.com/robertguetzkow/ets5-password-recovery
GitHub
GitHub - robertguetzkow/ets5-password-recovery: ETS5 Password Recovery Tool is a PoC for CVE-2021-36799
ETS5 Password Recovery Tool is a PoC for CVE-2021-36799 - robertguetzkow/ets5-password-recovery
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Proof-of-Concept for CVE-2021-41773
URL:https://github.com/ahmad4fifz/docker-cve-2021-41773
更新了:CVE-2021
描述:Proof-of-Concept for CVE-2021-41773
URL:https://github.com/ahmad4fifz/docker-cve-2021-41773
GitHub
GitHub - ahmad4fifz/CVE-2021-41773: CVE-2021-41773 on Docker
CVE-2021-41773 on Docker. Contribute to ahmad4fifz/CVE-2021-41773 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Assessment Common Scoring System
URL:https://github.com/jchy/RedBus-Clone
更新了:Red Team
描述:Red Teaming Assessment Common Scoring System
URL:https://github.com/jchy/RedBus-Clone
GitHub
GitHub - jchy/RedBus-Clone: This is a team Project, Where our team will be responsible for cloning the RebBus website. The website…
This is a team Project, Where our team will be responsible for cloning the RebBus website. The website that we will built, will be dynamic in nature i.e. it will be fully functional. We will use HT...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Collection Tools
URL:https://github.com/Joao-Paulino/RedTeamTools
更新了:Red Team
描述:Red Team Collection Tools
URL:https://github.com/Joao-Paulino/RedTeamTools
GitHub
GitHub - Joao-Paulino/RedTeamTools: Red Team Collection Tools
Red Team Collection Tools. Contribute to Joao-Paulino/RedTeamTools development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Exploitation code for CVE-2021-40539
URL:https://github.com/synacktiv/CVE-2021-40539
更新了:CVE-2021
描述:Exploitation code for CVE-2021-40539
URL:https://github.com/synacktiv/CVE-2021-40539
GitHub
GitHub - synacktiv/CVE-2021-40539: Exploitation code for CVE-2021-40539
Exploitation code for CVE-2021-40539. Contribute to synacktiv/CVE-2021-40539 development by creating an account on GitHub.