GitHub监控消息提醒!!!
更新了:CVE-2024
描述:is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
URL:https://github.com/geniuszlyy/GenCrushSSTIExploit
标签:#CVE-2024
更新了:CVE-2024
描述:is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
URL:https://github.com/geniuszlyy/GenCrushSSTIExploit
标签:#CVE-2024
GitHub
GitHub - geniuszly/GenCrushSSTIExploit: is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP - geniuszly/GenCrushSSTIExploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk
URL:https://github.com/PlayerFridei/CVE-2024-28987
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk
URL:https://github.com/PlayerFridei/CVE-2024-28987
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
URL:https://github.com/BertoldVdb/PcanExploit
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
URL:https://github.com/BertoldVdb/PcanExploit
标签:#CVE-2024
GitHub
GitHub - BertoldVdb/PcanExploit: CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways - BertoldVdb/PcanExploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A vulnerability scanner that searches for the CVE-2024-9166 vulnerability on websites, more info about this vulnerability here: https://www.tenable.com/cve/CVE-2024-9166
URL:https://github.com/Andrysqui/CVE-2024-9166
标签:#CVE-2024
更新了:CVE-2024
描述:A vulnerability scanner that searches for the CVE-2024-9166 vulnerability on websites, more info about this vulnerability here: https://www.tenable.com/cve/CVE-2024-9166
URL:https://github.com/Andrysqui/CVE-2024-9166
标签:#CVE-2024
Tenable
CVE-2024-9166
The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites
URL:https://github.com/geniuszlyy/CVE-2024-5522
标签:#CVE-2024
更新了:CVE-2024
描述:A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites
URL:https://github.com/geniuszlyy/CVE-2024-5522
标签:#CVE-2024
GitHub
GitHub - geniuszlyy/CVE-2024-5522: A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites
A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites - geniuszlyy/CVE-2024-5522
GitHub监控消息提醒!!!
更新了:反序列化
描述:【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行
URL:https://github.com/yukuyoulei/ConfigExcel
标签:#反序列化
更新了:反序列化
描述:【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行
URL:https://github.com/yukuyoulei/ConfigExcel
标签:#反序列化
GitHub
GitHub - yukuyoulei/ConfigExcel: 【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行
【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行 - yukuyoulei/ConfigExcel
GitHub监控消息提醒!!!
更新了:钓鱼
描述:PC自动玩尘白,尘白自动化代理,尘白禁区助手,尘白自动钓鱼
URL:https://github.com/LaoZhuJackson/SnowbreakAutoAssistant
标签:#钓鱼
更新了:钓鱼
描述:PC自动玩尘白,尘白自动化代理,尘白禁区助手,尘白自动钓鱼
URL:https://github.com/LaoZhuJackson/SnowbreakAutoAssistant
标签:#钓鱼
GitHub
GitHub - LaoZhuJackson/SnowbreakAutoAssistant: PC自动玩尘白,自动化代理,尘白禁区助手,自动钓鱼,信源解析,水弹,异星守护,迷宫
PC自动玩尘白,自动化代理,尘白禁区助手,自动钓鱼,信源解析,水弹,异星守护,迷宫. Contribute to LaoZhuJackson/SnowbreakAutoAssistant development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike.
URL:https://github.com/duck-sec/CVE-2023-41425
标签:#RCE
更新了:RCE
描述:CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike.
URL:https://github.com/duck-sec/CVE-2023-41425
标签:#RCE
GitHub
GitHub - duck-sec/CVE-2023-41425: CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if…
CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike. - duck-sec/CVE-2023-41425
GitHub监控消息提醒!!!
更新了:绕过
描述:这个域名是我用来做远程管理主机用的!因为我之前经常帮助别人,这些人遍布个人,企业,服务器/机房。都有大量的数据和重要服务!这个域名的作用就是通过DNS等隧道技术建立一个内网到外网的反向隧道。那我就可以绕过本地防火墙,直接建立连接!就请你们手下留情,不要发动d dos攻击或者是通过漏洞 弱小口令或社工盗取域名和解析的控制权,更不要通过抓包/中间人攻击或伪造虚假服务器等方式入侵这些主机!
URL:https://github.com/rd3389/domain
标签:#绕过
更新了:绕过
描述:这个域名是我用来做远程管理主机用的!因为我之前经常帮助别人,这些人遍布个人,企业,服务器/机房。都有大量的数据和重要服务!这个域名的作用就是通过DNS等隧道技术建立一个内网到外网的反向隧道。那我就可以绕过本地防火墙,直接建立连接!就请你们手下留情,不要发动d dos攻击或者是通过漏洞 弱小口令或社工盗取域名和解析的控制权,更不要通过抓包/中间人攻击或伪造虚假服务器等方式入侵这些主机!
URL:https://github.com/rd3389/domain
标签:#绕过
GitHub
rd3389/domain
这个域名是我用来做远程管理主机用的!因为我之前经常帮助别人,这些人遍布个人,企业,服务器/机房。都有大量的数据和重要服务!这个域名的作用就是通过DNS等隧道技术建立一个内网到外网的反向隧道。那我就可以绕过本地防火墙,直接建立连接!就请你们手下留情,不要发动d dos攻击或者是通过漏洞 弱小口令或社工盗取域名和解析的控制权,更不要通过抓包/中间人攻击或伪造虚假服务器等方式入侵这些主机! - r...
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:一款基于Go语言编写,针对赛蓝企业管理系统的漏洞检测工具
URL:https://github.com/Seven1an/CailsoftVulCheck
标签:#漏洞检测
更新了:漏洞检测
描述:一款基于Go语言编写,针对赛蓝企业管理系统的漏洞检测工具
URL:https://github.com/Seven1an/CailsoftVulCheck
标签:#漏洞检测
GitHub
GitHub - Seven1an/CailsoftVulCheck: 一款基于Go语言编写,针对赛蓝企业管理系统的漏洞检测工具
一款基于Go语言编写,针对赛蓝企业管理系统的漏洞检测工具. Contribute to Seven1an/CailsoftVulCheck development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:POC for CVE-2019-11248, remote code execution (RCE)
URL:https://github.com/nop2nop/cve-2019-11248
标签:#RCE
更新了:RCE
描述:POC for CVE-2019-11248, remote code execution (RCE)
URL:https://github.com/nop2nop/cve-2019-11248
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Ejecución de comandos para administrar mal configurados, RCE, Mensajes, Sabotaje.
URL:https://github.com/Kovax00/Hacking-PSRemoting
标签:#RCE
更新了:RCE
描述:Ejecución de comandos para administrar mal configurados, RCE, Mensajes, Sabotaje.
URL:https://github.com/Kovax00/Hacking-PSRemoting
标签:#RCE
GitHub
GitHub - Kovax00/Hacking-PSRemoting: Ejecución de comandos de administración mal configurados, RCE, Mensajes, Sabotaje.
Ejecución de comandos de administración mal configurados, RCE, Mensajes, Sabotaje. - Kovax00/Hacking-PSRemoting
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)
URL:https://github.com/geniuszlyy/CVE-2024-0582
标签:#CVE-2024
更新了:CVE-2024
描述:is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)
URL:https://github.com/geniuszlyy/CVE-2024-0582
标签:#CVE-2024
GitHub
GitHub - geniuszlyy/CVE-2024-0582: is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)
is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582) - geniuszlyy/CVE-2024-0582
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441)
URL:https://github.com/adhikara13/CVE-2024-9441
标签:#CVE-2024
更新了:CVE-2024
描述:Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441)
URL:https://github.com/adhikara13/CVE-2024-9441
标签:#CVE-2024
GitHub
GitHub - adhikara13/CVE-2024-9441: Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441)
Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441) - adhikara13/CVE-2024-9441
GitHub监控消息提醒!!!
更新了:bypass av
描述:webshell bypass AV
URL:https://github.com/villanitamosephadwgab/1ah-Avid-Pro-Toolsh
标签:#bypass av
更新了:bypass av
描述:webshell bypass AV
URL:https://github.com/villanitamosephadwgab/1ah-Avid-Pro-Toolsh
标签:#bypass av
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Unauthenticated RCE on cups-browsed (exploit)
URL:https://github.com/l0n3m4n/CVE-2024-47176
标签:#CVE-2024
更新了:CVE-2024
描述:Unauthenticated RCE on cups-browsed (exploit)
URL:https://github.com/l0n3m4n/CVE-2024-47176
标签:#CVE-2024
GitHub
GitHub - l0n3m4n/CVE-2024-47176: Unauthenticated RCE on cups-browsed (exploit and nuclei template)
Unauthenticated RCE on cups-browsed (exploit and nuclei template) - l0n3m4n/CVE-2024-47176
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE and XSS exploits testing
URL:https://github.com/thefizzyfish/CVE-2023-41425-wonderCMS_RCE
标签:#RCE
更新了:RCE
描述:RCE and XSS exploits testing
URL:https://github.com/thefizzyfish/CVE-2023-41425-wonderCMS_RCE
标签:#RCE
GitHub
GitHub - thefizzyfish/CVE-2023-41425-wonderCMS_RCE: CVE-2023-41425 - Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru…
CVE-2023-41425 - Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule componen...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.
URL:https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481
标签:#CVE-2024
更新了:CVE-2024
描述:TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.
URL:https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481
标签:#CVE-2024
GitHub
GitHub - PeterGabaldon/CVE-2024-7479_CVE-2024-7481: TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE…
TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006. - PeterGabaldon/CVE-2024-7479_CVE-2024-7481
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services.
URL:https://github.com/Akrachli/CVE-2024-29050
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services.
URL:https://github.com/Akrachli/CVE-2024-29050
标签:#CVE-2024
GitHub
GitHub - Akrachli/CVE-2024-29050: CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services.
CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services. - Akrachli/CVE-2024-29050
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE in pyload prior to 0.5.0b3.dev31.
URL:https://github.com/S4MY9/CVE-2023-0297
标签:#RCE
更新了:RCE
描述:RCE in pyload prior to 0.5.0b3.dev31.
URL:https://github.com/S4MY9/CVE-2023-0297
标签:#RCE
GitHub
GitHub - S4MY9/CVE-2023-0297: RCE in pyload prior to 0.5.0b3.dev31.
RCE in pyload prior to 0.5.0b3.dev31. Contribute to S4MY9/CVE-2023-0297 development by creating an account on GitHub.