GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Zerologon Exploiter I used on Cobalt Strike
URL:https://github.com/CPO-EH/SharpZeroLogon
更新了:Cobalt Strike
描述:Zerologon Exploiter I used on Cobalt Strike
URL:https://github.com/CPO-EH/SharpZeroLogon
GitHub
GitHub - CPO-EH/SharpZeroLogon: Zerologon Exploiter I used on Cobalt Strike
Zerologon Exploiter I used on Cobalt Strike. Contribute to CPO-EH/SharpZeroLogon development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A Visual Studio template used to create Cobalt Strike BOFs
URL:https://github.com/securifybv/Visual-Studio-BOF-template
更新了:Cobalt Strike
描述:A Visual Studio template used to create Cobalt Strike BOFs
URL:https://github.com/securifybv/Visual-Studio-BOF-template
GitHub
GitHub - securifybv/Visual-Studio-BOF-template: A Visual Studio template used to create Cobalt Strike BOFs
A Visual Studio template used to create Cobalt Strike BOFs - securifybv/Visual-Studio-BOF-template
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.
URL:https://github.com/iDigitalFlame/PvJ-CTF-RedTools
更新了:Red Team
描述:Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.
URL:https://github.com/iDigitalFlame/PvJ-CTF-RedTools
GitHub
GitHub - iDigitalFlame/PvJ-CTF-RedTools: Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand…
Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage. - iDigitalFlame/PvJ-CTF-RedTools
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CSP Playground for CVE-2021-30682
URL:https://github.com/threatnix/csp-playground
更新了:CVE-2021
描述:CSP Playground for CVE-2021-30682
URL:https://github.com/threatnix/csp-playground
GitHub
GitHub - threatnix/csp-playground: CSP Playground for CVE-2021-30682
CSP Playground for CVE-2021-30682. Contribute to threatnix/csp-playground development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:随机对Cobaltstrike生成的Powershell进行免杀.最高可全国Virustotal
URL:https://github.com/Cu1in/RadomShell
更新了:免杀
描述:随机对Cobaltstrike生成的Powershell进行免杀.最高可全国Virustotal
URL:https://github.com/Cu1in/RadomShell
GitHub
GitHub - Cu1in/RadomShell: 随机对Cobaltstrike生成的Powershell进行免杀.最高可全国Virustotal
随机对Cobaltstrike生成的Powershell进行免杀.最高可全国Virustotal. Contribute to Cu1in/RadomShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Dummy github repo for CVE-2021-32724 vulnerability exploit testing
URL:https://github.com/MaximeSchlegel/AMUM2-CVE-2021-32724-Target
更新了:CVE-2021
描述:Dummy github repo for CVE-2021-32724 vulnerability exploit testing
URL:https://github.com/MaximeSchlegel/AMUM2-CVE-2021-32724-Target
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/megatop1/RedTeam
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/megatop1/RedTeam
GitHub
GitHub - megatop1/RedTeam: Red Team Toolkit for CTF's and Learning for Windows Offense
Red Team Toolkit for CTF's and Learning for Windows Offense - GitHub - megatop1/RedTeam: Red Team Toolkit for CTF's and Learning for Windows Offense
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Repo demonstrating CVE-2021-43616 / https://github.com/npm/cli/issues/2701
URL:https://github.com/icatalina/CVE-2021-43616
更新了:CVE-2021
描述:Repo demonstrating CVE-2021-43616 / https://github.com/npm/cli/issues/2701
URL:https://github.com/icatalina/CVE-2021-43616
GitHub
[BUG] `npm ci` succeeds when `package-lock.json` doesn't match `package.json` · Issue #2701 · npm/cli
Current Behavior: npm ci does not fail when package.json doesn't match package-lock.json Expected Behavior: npm ci refuses to install when the lock file is invalid. Steps To Reproduce: Manually...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/redcanaryco/invoke-atomicredteam
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/redcanaryco/invoke-atomicredteam
GitHub
GitHub - redcanaryco/invoke-atomicredteam: Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics…
Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Re...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
URL:https://github.com/Sh0ckFR/InlineWhispers2
更新了:Cobalt Strike
描述:Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
URL:https://github.com/Sh0ckFR/InlineWhispers2
GitHub
GitHub - Sh0ckFR/InlineWhispers2: Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2 - Sh0ckFR/InlineWhispers2
GitHub监控消息提醒!!!
更新了:Red Team
描述:Assessment, Analysis, and Hardening of a vulnerable system. This presentation includes playing the role of both (Red Team) pentester and (Blue Team) SOC analyst on a vulnerable WebDAV server.
URL:https://github.com/cltempleton1127/UR-Cybersecurity-Red-Team-Blue-Team
更新了:Red Team
描述:Assessment, Analysis, and Hardening of a vulnerable system. This presentation includes playing the role of both (Red Team) pentester and (Blue Team) SOC analyst on a vulnerable WebDAV server.
URL:https://github.com/cltempleton1127/UR-Cybersecurity-Red-Team-Blue-Team
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Python 3 script to identify CVE-2021-26084 via network requests.
URL:https://github.com/quesodipesto/conflucheck
更新了:CVE-2021
描述:Python 3 script to identify CVE-2021-26084 via network requests.
URL:https://github.com/quesodipesto/conflucheck
GitHub
GitHub - quesodipesto/conflucheck: Python 3 script to identify CVE-2021-26084 via network requests.
Python 3 script to identify CVE-2021-26084 via network requests. - quesodipesto/conflucheck
GitHub监控消息提醒!!!
更新了:免杀
描述:Tomcat的Filter型免杀内存马,主要思路是Bypass各种检查手段
URL:https://github.com/EmYiQing/MemShell
更新了:免杀
描述:Tomcat的Filter型免杀内存马,主要思路是Bypass各种检查手段
URL:https://github.com/EmYiQing/MemShell
GitHub
GitHub - EmYiQing/MemShell: 记录自己研究的一些特殊Tomcat内存马
记录自己研究的一些特殊Tomcat内存马. Contribute to EmYiQing/MemShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:A collection of Python scripts for Red Teaming or otherwise
URL:https://github.com/wethered/offensive-scripts
更新了:Red Team
描述:A collection of Python scripts for Red Teaming or otherwise
URL:https://github.com/wethered/offensive-scripts
GitHub
GitHub - rivet1337/offensive-scripts: A collection of Python scripts for Red Teaming or otherwise
A collection of Python scripts for Red Teaming or otherwise - GitHub - rivet1337/offensive-scripts: A collection of Python scripts for Red Teaming or otherwise
GitHub监控消息提醒!!!
更新了:Red Team
描述:Download Linux & Windows Binaries/Scripts used for Red Teaming & Pentesting
URL:https://github.com/mashm3ll0w/pentest-tools
更新了:Red Team
描述:Download Linux & Windows Binaries/Scripts used for Red Teaming & Pentesting
URL:https://github.com/mashm3ll0w/pentest-tools