GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Exploitation code for CVE-2021-40539
URL:https://github.com/synacktiv/CVE-2021-40539
更新了:CVE-2021
描述:Exploitation code for CVE-2021-40539
URL:https://github.com/synacktiv/CVE-2021-40539
GitHub
GitHub - synacktiv/CVE-2021-40539: Exploitation code for CVE-2021-40539
Exploitation code for CVE-2021-40539. Contribute to synacktiv/CVE-2021-40539 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985)
URL:https://github.com/sknux/CVE-2021-21985_PoC
更新了:CVE-2021
描述:VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985)
URL:https://github.com/sknux/CVE-2021-21985_PoC
GitHub
GitHub - sknux/CVE-2021-21985_PoC: VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985)
VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985) - sknux/CVE-2021-21985_PoC
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team vs Blue Team Project for my Cyber Security Bootcamp.
URL:https://github.com/IDreamofAzathoth/Red-Team-Blue-Team
更新了:Red Team
描述:Red Team vs Blue Team Project for my Cyber Security Bootcamp.
URL:https://github.com/IDreamofAzathoth/Red-Team-Blue-Team
GitHub
GitHub - IDreamofAzathoth/Red-Team-Blue-Team: Red Team vs Blue Team Project for my Cyber Security Bootcamp.
Red Team vs Blue Team Project for my Cyber Security Bootcamp. - IDreamofAzathoth/Red-Team-Blue-Team
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.
URL:https://github.com/corelight/CVE-2021-42292
更新了:CVE-2021
描述:A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.
URL:https://github.com/corelight/CVE-2021-42292
GitHub
GitHub - corelight/CVE-2021-42292: A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.
A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit. - corelight/CVE-2021-42292
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
URL:https://github.com/ly4k/CallbackHell
更新了:CVE-2021
描述:Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
URL:https://github.com/ly4k/CallbackHell
GitHub
GitHub - ly4k/CallbackHell: Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE) - ly4k/CallbackHell
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Dockerized Proof-of-Concept of CVE-2021-40438 in Apache 2.4.48.
URL:https://github.com/ericmann/apache-cve-poc
更新了:CVE-2021
描述:Dockerized Proof-of-Concept of CVE-2021-40438 in Apache 2.4.48.
URL:https://github.com/ericmann/apache-cve-poc
GitHub
GitHub - ericmann/apache-cve-poc: Dockerized Proof-of-Concept of CVE-2021-40438 in Apache 2.4.48.
Dockerized Proof-of-Concept of CVE-2021-40438 in Apache 2.4.48. - ericmann/apache-cve-poc
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team vs Blue Team Project for my Cyber Security Bootcamp.
URL:https://github.com/Softterier/COMPETENCIAS
更新了:Red Team
描述:Red Team vs Blue Team Project for my Cyber Security Bootcamp.
URL:https://github.com/Softterier/COMPETENCIAS
GitHub监控消息提醒!!!
更新了:Red Team
描述:Homework 3 - Red Team Tool - CDT 473
URL:https://github.com/ajc9076/red-team-tool
更新了:Red Team
描述:Homework 3 - Red Team Tool - CDT 473
URL:https://github.com/ajc9076/red-team-tool
GitHub
GitHub - ajc9076/red-team-tool: Homework 3 - Red Team Tool - CDT 473
Homework 3 - Red Team Tool - CDT 473. Contribute to ajc9076/red-team-tool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies.
URL:https://github.com/joshblack07/UR-Cyber-Security-Red_vs_Blue
更新了:Red Team
描述:Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies.
URL:https://github.com/joshblack07/UR-Cyber-Security-Red_vs_Blue
GitHub
GitHub - joshblack07/UR-Cyber-Security-Red_vs_Blue: Assessment, Analysis, and Hardening of a vulnerable system. This report includes…
Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies. - joshblack07/UR-...
GitHub监控消息提醒!!!
更新了:Red Team
描述:C# Script used for Red Team
URL:https://github.com/Mr-Un1k0d3r/RedTeamCSharpScripts
更新了:Red Team
描述:C# Script used for Red Team
URL:https://github.com/Mr-Un1k0d3r/RedTeamCSharpScripts
GitHub
GitHub - Mr-Un1k0d3r/RedTeamCSharpScripts: C# Script used for Red Team
C# Script used for Red Team. Contribute to Mr-Un1k0d3r/RedTeamCSharpScripts development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:.NET implementation of Cobalt Strike's External C2 Spec
URL:https://github.com/rasta-mouse/ExternalC2.NET
更新了:Cobalt Strike
描述:.NET implementation of Cobalt Strike's External C2 Spec
URL:https://github.com/rasta-mouse/ExternalC2.NET
GitHub
GitHub - rasta-mouse/ExternalC2.NET: .NET implementation of Cobalt Strike's External C2 Spec
.NET implementation of Cobalt Strike's External C2 Spec - GitHub - rasta-mouse/ExternalC2.NET: .NET implementation of Cobalt Strike's External C2 Spec
GitHub监控消息提醒!!!
更新了:免杀
描述:结合反射调用、动态编译、BCEL、defineClass0,ScriptEngine、Expression等技术的一款免杀JSP Webshell生成工具
URL:https://github.com/cirosantilli/cirosantilli
更新了:免杀
描述:结合反射调用、动态编译、BCEL、defineClass0,ScriptEngine、Expression等技术的一款免杀JSP Webshell生成工具
URL:https://github.com/cirosantilli/cirosantilli
GitHub
GitHub - cirosantilli/cirosantilli: 小粉红小朋友们,新issue 在这儿开: https://github.com/cirosantilli/china-dictatorship/issues # 21世纪新政宣言(…
小粉红小朋友们,新issue 在这儿开: https://github.com/cirosantilli/china-dictatorship/issues # 21世纪新政宣言(2020年4月5曰笫四次修改稿)(2020年6月19曰第七次修改,以下“【】”内文字为非正文内容的说明)20世纪苏联的消亡和东欧的大变革,使这21世纪初的现中国大陆成为世界关注的最主要焦点和影响新世纪文明发展的关键...
GitHub监控消息提醒!!!
更新了:红队
描述:常用功能,以类封装增强复用性。以命名空间分类,涉及C2研发过程中三端应用以及红队相关技术的整理(他人代码的整合)
URL:https://github.com/bopin2020/SharpPlugins
更新了:红队
描述:常用功能,以类封装增强复用性。以命名空间分类,涉及C2研发过程中三端应用以及红队相关技术的整理(他人代码的整合)
URL:https://github.com/bopin2020/SharpPlugins
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Zerologon Exploiter I used on Cobalt Strike
URL:https://github.com/CPO-EH/SharpZeroLogon
更新了:Cobalt Strike
描述:Zerologon Exploiter I used on Cobalt Strike
URL:https://github.com/CPO-EH/SharpZeroLogon
GitHub
GitHub - CPO-EH/SharpZeroLogon: Zerologon Exploiter I used on Cobalt Strike
Zerologon Exploiter I used on Cobalt Strike. Contribute to CPO-EH/SharpZeroLogon development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A Visual Studio template used to create Cobalt Strike BOFs
URL:https://github.com/securifybv/Visual-Studio-BOF-template
更新了:Cobalt Strike
描述:A Visual Studio template used to create Cobalt Strike BOFs
URL:https://github.com/securifybv/Visual-Studio-BOF-template
GitHub
GitHub - securifybv/Visual-Studio-BOF-template: A Visual Studio template used to create Cobalt Strike BOFs
A Visual Studio template used to create Cobalt Strike BOFs - securifybv/Visual-Studio-BOF-template
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.
URL:https://github.com/iDigitalFlame/PvJ-CTF-RedTools
更新了:Red Team
描述:Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.
URL:https://github.com/iDigitalFlame/PvJ-CTF-RedTools
GitHub
GitHub - iDigitalFlame/PvJ-CTF-RedTools: Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand…
Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage. - iDigitalFlame/PvJ-CTF-RedTools
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CSP Playground for CVE-2021-30682
URL:https://github.com/threatnix/csp-playground
更新了:CVE-2021
描述:CSP Playground for CVE-2021-30682
URL:https://github.com/threatnix/csp-playground
GitHub
GitHub - threatnix/csp-playground: CSP Playground for CVE-2021-30682
CSP Playground for CVE-2021-30682. Contribute to threatnix/csp-playground development by creating an account on GitHub.