GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Scanner for the CUPS vulnerability CVE-2024-47176
URL:https://github.com/tonyarris/CVE-2024-47176-Scanner
标签:#CVE-2024
更新了:CVE-2024
描述:Scanner for the CUPS vulnerability CVE-2024-47176
URL:https://github.com/tonyarris/CVE-2024-47176-Scanner
标签:#CVE-2024
GitHub
GitHub - tonyarris/CVE-2024-47176-Scanner: Scanner for the CUPS vulnerability CVE-2024-47176
Scanner for the CUPS vulnerability CVE-2024-47176. Contribute to tonyarris/CVE-2024-47176-Scanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CUPS LINUX RCE Attempts and Callback heuristics
URL:https://github.com/initconf/2024-09-cups-linux-rce
标签:#RCE
更新了:RCE
描述:CUPS LINUX RCE Attempts and Callback heuristics
URL:https://github.com/initconf/2024-09-cups-linux-rce
标签:#RCE
GitHub
GitHub - initconf/2024-09-cups-linux-rce: CUPS LINUX RCE Attempts and Callback heuristics
CUPS LINUX RCE Attempts and Callback heuristics . Contribute to initconf/2024-09-cups-linux-rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)
URL:https://github.com/paragbagul111/CVE-2024-33209
标签:#CVE-2024
更新了:CVE-2024
描述:Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)
URL:https://github.com/paragbagul111/CVE-2024-33209
标签:#CVE-2024
GitHub
GitHub - paragbagul111/CVE-2024-33209: FlatPress 1.3. is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious…
FlatPress 1.3. is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the "Add New Entry" section, which allows them to execute arbitra...
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-36837 POC
URL:https://github.com/lhc321-source/CVE-2024-36837
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-36837 POC
URL:https://github.com/lhc321-source/CVE-2024-36837
标签:#CVE-2024
GitHub
GitHub - lhc321-source/CVE-2024-36837: CVE-2024-36837 POC
CVE-2024-36837 POC. Contribute to lhc321-source/CVE-2024-36837 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions
URL:https://github.com/PunitTailor55/GeoServer-CVE-2024-36401
标签:#CVE-2024
更新了:CVE-2024
描述:GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions
URL:https://github.com/PunitTailor55/GeoServer-CVE-2024-36401
标签:#CVE-2024
GitHub
GitHub - punitdarji/GeoServer-CVE-2024-36401: GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating…
GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions - punitdarji/GeoServer-CVE-2024-36401
GitHub监控消息提醒!!!
更新了:反序列化
描述:idea插件,快速生成反序列化中常用的方法,比如setFieldValue、createTemplatesImpl等
URL:https://github.com/yulate/ReflectorMate
标签:#反序列化
更新了:反序列化
描述:idea插件,快速生成反序列化中常用的方法,比如setFieldValue、createTemplatesImpl等
URL:https://github.com/yulate/ReflectorMate
标签:#反序列化
GitHub
GitHub - yulate/ReflectorMate: idea插件,快速生成反序列化中常用的方法,比如setFieldValue、createTemplatesImpl等
idea插件,快速生成反序列化中常用的方法,比如setFieldValue、createTemplatesImpl等 - yulate/ReflectorMate
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Vulnerability Scanner for CUPS: CVE-2024-47176
URL:https://github.com/aytackalinci/CVE-2024-47176
标签:#CVE-2024
更新了:CVE-2024
描述:Vulnerability Scanner for CUPS: CVE-2024-47176
URL:https://github.com/aytackalinci/CVE-2024-47176
标签:#CVE-2024
GitHub
GitHub - aytackalinci/CVE-2024-47176: Vulnerability Scanner for CUPS: CVE-2024-47176
Vulnerability Scanner for CUPS: CVE-2024-47176. Contribute to aytackalinci/CVE-2024-47176 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:护网神器,手搓入侵检测工具。可以利用其捕获0Day、目录恶意文件上传监控、注入、黑客常用工具等等入侵行为监控。
URL:https://github.com/chz2008/IDSMonitor
标签:#护网
更新了:护网
描述:护网神器,手搓入侵检测工具。可以利用其捕获0Day、目录恶意文件上传监控、注入、黑客常用工具等等入侵行为监控。
URL:https://github.com/chz2008/IDSMonitor
标签:#护网
GitHub
GitHub - chz2008/IDSMonitor: 护网神器,手搓入侵检测工具。可以利用其捕获0Day、目录恶意文件上传监控、注入、黑客常用工具等等入侵行为监控。
护网神器,手搓入侵检测工具。可以利用其捕获0Day、目录恶意文件上传监控、注入、黑客常用工具等等入侵行为监控。 - chz2008/IDSMonitor
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
URL:https://github.com/Zjackky/CodeScan
标签:#代码审计
更新了:代码审计
描述:一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
URL:https://github.com/Zjackky/CodeScan
标签:#代码审计
GitHub
GitHub - Zjackky/CodeScan: 一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具. Contribute to Zjackky/CodeScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2021-3129 Laravel Ignition RCE Exploit
URL:https://github.com/0x0d3ad/CVE-2021-3129
标签:#RCE
更新了:RCE
描述:CVE-2021-3129 Laravel Ignition RCE Exploit
URL:https://github.com/0x0d3ad/CVE-2021-3129
标签:#RCE
GitHub
GitHub - 0x0d3ad/CVE-2021-3129: CVE-2021-3129 (Laravel Ignition RCE Exploit)
CVE-2021-3129 (Laravel Ignition RCE Exploit). Contribute to 0x0d3ad/CVE-2021-3129 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:sql注入自动化工具,基于sqli-labs进行测试
URL:https://github.com/iamnotamaster/sql-injecter
标签:#sql注入
更新了:sql注入
描述:sql注入自动化工具,基于sqli-labs进行测试
URL:https://github.com/iamnotamaster/sql-injecter
标签:#sql注入
GitHub
GitHub - iamnotamaster/sql-injecter: sql注入自动化工具,基于sqli-labs进行测试
sql注入自动化工具,基于sqli-labs进行测试. Contribute to iamnotamaster/sql-injecter development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Puma Header normalization CVE-2024-45614 確認
URL:https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614
标签:#CVE-2024
更新了:CVE-2024
描述:Puma Header normalization CVE-2024-45614 確認
URL:https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614
标签:#CVE-2024
GitHub
GitHub - ooooooo-q/puma_header_normalization-CVE-2024-45614: Puma Header normalization CVE-2024-45614 確認
Puma Header normalization CVE-2024-45614 確認. Contribute to ooooooo-q/puma_header_normalization-CVE-2024-45614 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses
URL:https://github.com/geniuszlyy/CVE-2024-24919
标签:#CVE-2024
更新了:CVE-2024
描述:PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses
URL:https://github.com/geniuszlyy/CVE-2024-24919
标签:#CVE-2024
GitHub
GitHub - geniuszlyy/CVE-2024-24919: PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security…
PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses - geniuszlyy/CVE-2024-24919
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
URL:https://github.com/Night-Master/sdlc_python
标签:#代码审计
更新了:代码审计
描述:一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
URL:https://github.com/Night-Master/sdlc_python
标签:#代码审计
GitHub
GitHub - Night-Master/sdlc_python: sdlc_python 是一个基于python语言构建的devsecops平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员…
sdlc_python 是一个基于python语言构建的devsecops平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识(对应sdlc中对开发人员的安全培训),并且使用了大模型进行代码安全审计(对应sdlc中代码审计阶段),帮助企业进行安全左移。除了用于 DevSecOps 实践外,sdlc_python 还可以用于学习...
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository its for testing my projects about RCE or simply binders
URL:https://github.com/KasaneMitaka/CalcForTests
标签:#RCE
更新了:RCE
描述:This repository its for testing my projects about RCE or simply binders
URL:https://github.com/KasaneMitaka/CalcForTests
标签:#RCE
GitHub
GitHub - KasaneMitaka/CalcForTests: This repository its for testing my projects about RCE or simply binders
This repository its for testing my projects about RCE or simply binders - KasaneMitaka/CalcForTests
👎1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz.
URL:https://github.com/mutkus/CVE-2024-47076
标签:#CVE-2024
更新了:CVE-2024
描述:Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz.
URL:https://github.com/mutkus/CVE-2024-47076
标签:#CVE-2024
GitHub
GitHub - mutkus/CVE-2024-47076: Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile…
Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz. - mutkus/CVE-2024-47076
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A simple CVE-2024-47176 (cups_browsed) check tool written in go.
URL:https://github.com/nma-io/CVE-2024-47176
标签:#CVE-2024
更新了:CVE-2024
描述:A simple CVE-2024-47176 (cups_browsed) check tool written in go.
URL:https://github.com/nma-io/CVE-2024-47176
标签:#CVE-2024
GitHub
GitHub - nma-io/CVE-2024-47176: A simple CVE-2024-47176 (cups_browsed) check tool written in go.
A simple CVE-2024-47176 (cups_browsed) check tool written in go. - GitHub - nma-io/CVE-2024-47176: A simple CVE-2024-47176 (cups_browsed) check tool written in go.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability
URL:https://github.com/latte-soft/kartlanpwn
标签:#CVE-2024
更新了:CVE-2024
描述:Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability
URL:https://github.com/latte-soft/kartlanpwn
标签:#CVE-2024
GitHub
GitHub - latte-soft/kartlanpwn: Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability
Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability - latte-soft/kartlanpwn
GitHub监控消息提醒!!!
更新了:红队
描述:红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
URL:https://github.com/xiaoze521/arl_scan_xpoc_nuclei
标签:#红队
更新了:红队
描述:红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
URL:https://github.com/xiaoze521/arl_scan_xpoc_nuclei
标签:#红队
GitHub
GitHub - xiaoze521/arl_scan_xpoc_nuclei: 红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。. Contribute to xiaoze521/arl_scan_xpoc_nuclei development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
URL:https://github.com/AgonySec/ThinkPHPGUI
标签:#漏洞检测
更新了:漏洞检测
描述:使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
URL:https://github.com/AgonySec/ThinkPHPGUI
标签:#漏洞检测
GitHub
GitHub - AgonySec/ThinkPHPGUI: 使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具. Contribute to AgonySec/ThinkPHPGUI development by creating an account on GitHub.