GitHub监控消息提醒!!!
更新了:护网
描述:护网神器,手搓入侵检测工具。可以利用其捕获0Day、目录恶意文件上传监控、注入、黑客常用工具等等入侵行为监控。
URL:https://github.com/chz2008/IDSMonitor
标签:#护网
更新了:护网
描述:护网神器,手搓入侵检测工具。可以利用其捕获0Day、目录恶意文件上传监控、注入、黑客常用工具等等入侵行为监控。
URL:https://github.com/chz2008/IDSMonitor
标签:#护网
GitHub
GitHub - chz2008/IDSMonitor: 护网神器,手搓入侵检测工具。可以利用其捕获0Day、目录恶意文件上传监控、注入、黑客常用工具等等入侵行为监控。
护网神器,手搓入侵检测工具。可以利用其捕获0Day、目录恶意文件上传监控、注入、黑客常用工具等等入侵行为监控。 - chz2008/IDSMonitor
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
URL:https://github.com/Zjackky/CodeScan
标签:#代码审计
更新了:代码审计
描述:一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
URL:https://github.com/Zjackky/CodeScan
标签:#代码审计
GitHub
GitHub - Zjackky/CodeScan: 一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具. Contribute to Zjackky/CodeScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2021-3129 Laravel Ignition RCE Exploit
URL:https://github.com/0x0d3ad/CVE-2021-3129
标签:#RCE
更新了:RCE
描述:CVE-2021-3129 Laravel Ignition RCE Exploit
URL:https://github.com/0x0d3ad/CVE-2021-3129
标签:#RCE
GitHub
GitHub - 0x0d3ad/CVE-2021-3129: CVE-2021-3129 (Laravel Ignition RCE Exploit)
CVE-2021-3129 (Laravel Ignition RCE Exploit). Contribute to 0x0d3ad/CVE-2021-3129 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:sql注入自动化工具,基于sqli-labs进行测试
URL:https://github.com/iamnotamaster/sql-injecter
标签:#sql注入
更新了:sql注入
描述:sql注入自动化工具,基于sqli-labs进行测试
URL:https://github.com/iamnotamaster/sql-injecter
标签:#sql注入
GitHub
GitHub - iamnotamaster/sql-injecter: sql注入自动化工具,基于sqli-labs进行测试
sql注入自动化工具,基于sqli-labs进行测试. Contribute to iamnotamaster/sql-injecter development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Puma Header normalization CVE-2024-45614 確認
URL:https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614
标签:#CVE-2024
更新了:CVE-2024
描述:Puma Header normalization CVE-2024-45614 確認
URL:https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614
标签:#CVE-2024
GitHub
GitHub - ooooooo-q/puma_header_normalization-CVE-2024-45614: Puma Header normalization CVE-2024-45614 確認
Puma Header normalization CVE-2024-45614 確認. Contribute to ooooooo-q/puma_header_normalization-CVE-2024-45614 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses
URL:https://github.com/geniuszlyy/CVE-2024-24919
标签:#CVE-2024
更新了:CVE-2024
描述:PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses
URL:https://github.com/geniuszlyy/CVE-2024-24919
标签:#CVE-2024
GitHub
GitHub - geniuszlyy/CVE-2024-24919: PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security…
PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses - geniuszlyy/CVE-2024-24919
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
URL:https://github.com/Night-Master/sdlc_python
标签:#代码审计
更新了:代码审计
描述:一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
URL:https://github.com/Night-Master/sdlc_python
标签:#代码审计
GitHub
GitHub - Night-Master/sdlc_python: sdlc_python 是一个基于python语言构建的devsecops平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员…
sdlc_python 是一个基于python语言构建的devsecops平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识(对应sdlc中对开发人员的安全培训),并且使用了大模型进行代码安全审计(对应sdlc中代码审计阶段),帮助企业进行安全左移。除了用于 DevSecOps 实践外,sdlc_python 还可以用于学习...
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository its for testing my projects about RCE or simply binders
URL:https://github.com/KasaneMitaka/CalcForTests
标签:#RCE
更新了:RCE
描述:This repository its for testing my projects about RCE or simply binders
URL:https://github.com/KasaneMitaka/CalcForTests
标签:#RCE
GitHub
GitHub - KasaneMitaka/CalcForTests: This repository its for testing my projects about RCE or simply binders
This repository its for testing my projects about RCE or simply binders - KasaneMitaka/CalcForTests
👎1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz.
URL:https://github.com/mutkus/CVE-2024-47076
标签:#CVE-2024
更新了:CVE-2024
描述:Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz.
URL:https://github.com/mutkus/CVE-2024-47076
标签:#CVE-2024
GitHub
GitHub - mutkus/CVE-2024-47076: Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile…
Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz. - mutkus/CVE-2024-47076
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A simple CVE-2024-47176 (cups_browsed) check tool written in go.
URL:https://github.com/nma-io/CVE-2024-47176
标签:#CVE-2024
更新了:CVE-2024
描述:A simple CVE-2024-47176 (cups_browsed) check tool written in go.
URL:https://github.com/nma-io/CVE-2024-47176
标签:#CVE-2024
GitHub
GitHub - nma-io/CVE-2024-47176: A simple CVE-2024-47176 (cups_browsed) check tool written in go.
A simple CVE-2024-47176 (cups_browsed) check tool written in go. - GitHub - nma-io/CVE-2024-47176: A simple CVE-2024-47176 (cups_browsed) check tool written in go.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability
URL:https://github.com/latte-soft/kartlanpwn
标签:#CVE-2024
更新了:CVE-2024
描述:Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability
URL:https://github.com/latte-soft/kartlanpwn
标签:#CVE-2024
GitHub
GitHub - latte-soft/kartlanpwn: Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability
Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability - latte-soft/kartlanpwn
GitHub监控消息提醒!!!
更新了:红队
描述:红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
URL:https://github.com/xiaoze521/arl_scan_xpoc_nuclei
标签:#红队
更新了:红队
描述:红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
URL:https://github.com/xiaoze521/arl_scan_xpoc_nuclei
标签:#红队
GitHub
GitHub - xiaoze521/arl_scan_xpoc_nuclei: 红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。. Contribute to xiaoze521/arl_scan_xpoc_nuclei development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
URL:https://github.com/AgonySec/ThinkPHPGUI
标签:#漏洞检测
更新了:漏洞检测
描述:使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
URL:https://github.com/AgonySec/ThinkPHPGUI
标签:#漏洞检测
GitHub
GitHub - AgonySec/ThinkPHPGUI: 使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具. Contribute to AgonySec/ThinkPHPGUI development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞复现
描述:基于docker的redis未授权访问漏洞复现环境
URL:https://github.com/ajisai-babu/redis-unauth-hub
标签:#漏洞复现
更新了:漏洞复现
描述:基于docker的redis未授权访问漏洞复现环境
URL:https://github.com/ajisai-babu/redis-unauth-hub
标签:#漏洞复现
GitHub
GitHub - ajisai-babu/redis-unauth-hub: 基于docker的redis未授权访问漏洞复现环境
基于docker的redis未授权访问漏洞复现环境. Contribute to ajisai-babu/redis-unauth-hub development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Ultrafast CUPS-browsed scanner (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177)
URL:https://github.com/lkarlslund/jugular
标签:#CVE-2024
更新了:CVE-2024
描述:Ultrafast CUPS-browsed scanner (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177)
URL:https://github.com/lkarlslund/jugular
标签:#CVE-2024
GitHub
GitHub - lkarlslund/jugular: Ultrafast CUPS-browsed scanner (CVE-2024-47176)
Ultrafast CUPS-browsed scanner (CVE-2024-47176). Contribute to lkarlslund/jugular development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:利用流量工具,抓取流量层面的sql注入、高危命令等等攻击
URL:https://github.com/chz2008/capturesqli
标签:#sql注入
更新了:sql注入
描述:利用流量工具,抓取流量层面的sql注入、高危命令等等攻击
URL:https://github.com/chz2008/capturesqli
标签:#sql注入
GitHub
GitHub - Zer08Bytes/capturesqli: 利用流量工具,抓取流量层面的sql注入、高危命令等等攻击
利用流量工具,抓取流量层面的sql注入、高危命令等等攻击. Contribute to Zer08Bytes/capturesqli development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-8353
URL:https://github.com/EQSTLab/CVE-2024-8353
标签:#CVE-2024
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-8353
URL:https://github.com/EQSTLab/CVE-2024-8353
标签:#CVE-2024
GitHub
GitHub - EQSTLab/CVE-2024-8353: GiveWP PHP Object Injection exploit
GiveWP PHP Object Injection exploit. Contribute to EQSTLab/CVE-2024-8353 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass av
描述:such cobaltstrike loder to bypass av
URL:https://github.com/rexbrew206ii6z/1av-Microsoft-PowerPointv
标签:#bypass av
更新了:bypass av
描述:such cobaltstrike loder to bypass av
URL:https://github.com/rexbrew206ii6z/1av-Microsoft-PowerPointv
标签:#bypass av
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
URL:https://github.com/geniuszlyy/GenCrushSSTIExploit
标签:#CVE-2024
更新了:CVE-2024
描述:is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
URL:https://github.com/geniuszlyy/GenCrushSSTIExploit
标签:#CVE-2024
GitHub
GitHub - geniuszly/GenCrushSSTIExploit: is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP - geniuszly/GenCrushSSTIExploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk
URL:https://github.com/PlayerFridei/CVE-2024-28987
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk
URL:https://github.com/PlayerFridei/CVE-2024-28987
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
URL:https://github.com/BertoldVdb/PcanExploit
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
URL:https://github.com/BertoldVdb/PcanExploit
标签:#CVE-2024
GitHub
GitHub - BertoldVdb/PcanExploit: CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways - BertoldVdb/PcanExploit