GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Confluence OGNL expression injected RCE(CVE-2022-26134) poc and exp
URL:https://github.com/SNCKER/CVE-2022-26134
标签:#CVE-2022
更新了:CVE-2022
描述:Confluence OGNL expression injected RCE(CVE-2022-26134) poc and exp
URL:https://github.com/SNCKER/CVE-2022-26134
标签:#CVE-2022
GitHub
GitHub - SNCKER/CVE-2022-26134: [CVE-2022-26134]Confluence OGNL expression injected RCE with sandbox bypass.
[CVE-2022-26134]Confluence OGNL expression injected RCE with sandbox bypass. - SNCKER/CVE-2022-26134
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-26133 Exploit
URL:https://github.com/0xAbbarhSF/CVE-2022-26133
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-26133 Exploit
URL:https://github.com/0xAbbarhSF/CVE-2022-26133
标签:#CVE-2022
GitHub
GitHub - 0xAbbarhSF/CVE-2022-26133: CVE-2022-26133 Exploit
CVE-2022-26133 Exploit . Contribute to 0xAbbarhSF/CVE-2022-26133 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:漏洞资产手机、漏洞扫描、漏洞利用、后门上传一体化的工具
URL:https://github.com/sh3llCat2007/zhMM
标签:#漏洞利用
更新了:漏洞利用
描述:漏洞资产手机、漏洞扫描、漏洞利用、后门上传一体化的工具
URL:https://github.com/sh3llCat2007/zhMM
标签:#漏洞利用
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:PoC of CVE-2022-22978 vulnerability in Spring Security framework
URL:https://github.com/ducluongtran9121/CVE-2022-22978-PoC
标签:#CVE-2022
更新了:CVE-2022
描述:PoC of CVE-2022-22978 vulnerability in Spring Security framework
URL:https://github.com/ducluongtran9121/CVE-2022-22978-PoC
标签:#CVE-2022
GitHub
GitHub - ducluongtran9121/CVE-2022-22978-PoC: PoC of CVE-2022-22978 vulnerability in Spring Security framework
PoC of CVE-2022-22978 vulnerability in Spring Security framework - ducluongtran9121/CVE-2022-22978-PoC
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-29464 PoC for WSO2 products
URL:https://github.com/jimidk/Better-CVE-2022-29464
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-29464 PoC for WSO2 products
URL:https://github.com/jimidk/Better-CVE-2022-29464
标签:#CVE-2022
GitHub
GitHub - jimidk/Better-CVE-2022-29464: CVE-2022-29464 PoC for WSO2 products
CVE-2022-29464 PoC for WSO2 products. Contribute to jimidk/Better-CVE-2022-29464 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134。
URL:https://github.com/W01fh4cker/Serein
标签:#CVE-2022
更新了:CVE-2022
描述:【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134。
URL:https://github.com/W01fh4cker/Serein
标签:#CVE-2022
GitHub
GitHub - W01fh4cker/Serein: 【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited…
【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。 - W01fh4cker/Se...
GitHub监控消息提醒!!!
更新了:代码注入
描述:PHP代码审计(SQL注入+XSS+CSRF+命令注入)
URL:https://github.com/githubXiaowangzi/NP-Manager
标签:#代码注入
更新了:代码注入
描述:PHP代码审计(SQL注入+XSS+CSRF+命令注入)
URL:https://github.com/githubXiaowangzi/NP-Manager
标签:#代码注入
GitHub
GitHub - githubXiaowangzi/NP-Manager: Apk控制流混淆;Apk-Dex2C;Res资源混淆;Dex、jar、smali文件的相互转换; Dex、Pdf文件合并; Apk、dex、jar混淆和字符串加密; Apk签名、共存;…
Apk控制流混淆;Apk-Dex2C;Res资源混淆;Dex、jar、smali文件的相互转换; Dex、Pdf文件合并; Apk、dex、jar混淆和字符串加密; Apk签名、共存; Res资源混淆; Dex、AXML、ARSC文件编辑及翻译;字符串加密(Apk、dex); 一键添加Xposed检测,一键添加弹窗、对话框; axml反编译/回编译; 一键LOG添加; 一键添加字符串解密L...
❤1
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Proof of Concept/Test for CVE-2022-24713 on Ubuntu
URL:https://github.com/ItzSwirlz/CVE-2022-24713-POC
标签:#CVE-2022
更新了:CVE-2022
描述:Proof of Concept/Test for CVE-2022-24713 on Ubuntu
URL:https://github.com/ItzSwirlz/CVE-2022-24713-POC
标签:#CVE-2022
GitHub
GitHub - ItzSwirlz/CVE-2022-24713-POC: Proof of Concept/Test for CVE-2022-24713 on Ubuntu
Proof of Concept/Test for CVE-2022-24713 on Ubuntu - GitHub - ItzSwirlz/CVE-2022-24713-POC: Proof of Concept/Test for CVE-2022-24713 on Ubuntu
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)
URL:https://github.com/h3v0x/CVE-2022-26134
标签:#CVE-2022
更新了:CVE-2022
描述:Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)
URL:https://github.com/h3v0x/CVE-2022-26134
标签:#CVE-2022
GitHub
GitHub - hev0x/CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)
Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134) - hev0x/CVE-2022-26134
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Microsoft MS-MSDT Follina (0-day Vulnerability) CVE-2022-30190 PoC
URL:https://github.com/IamVSM/msdt-follina
标签:#CVE-2022
更新了:CVE-2022
描述:Microsoft MS-MSDT Follina (0-day Vulnerability) CVE-2022-30190 PoC
URL:https://github.com/IamVSM/msdt-follina
标签:#CVE-2022
GitHub
GitHub - IamVSM/msdt-follina: Microsoft MS-MSDT Follina (0-day Vulnerability) CVE-2022-30190 Attack Vector
Microsoft MS-MSDT Follina (0-day Vulnerability) CVE-2022-30190 Attack Vector - GitHub - IamVSM/msdt-follina: Microsoft MS-MSDT Follina (0-day Vulnerability) CVE-2022-30190 Attack Vector
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Challenge for you all to prove that CVE-2022–29622 is not false
URL:https://github.com/keymandll/CVE-2022-29622
标签:#CVE-2022
更新了:CVE-2022
描述:Challenge for you all to prove that CVE-2022–29622 is not false
URL:https://github.com/keymandll/CVE-2022-29622
标签:#CVE-2022
GitHub
GitHub - keymandll/CVE-2022-29622: Hack this service to prove CVE-2022–29622 is valid
Hack this service to prove CVE-2022–29622 is valid - keymandll/CVE-2022-29622
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:CVE-2022-0847 used to achieve container escape
URL:https://github.com/greenhandatsjtu/CVE-2022-0847
标签:#CVE-2022
更新了:CVE-2022
描述:CVE-2022-0847 used to achieve container escape
URL:https://github.com/greenhandatsjtu/CVE-2022-0847
标签:#CVE-2022
GitHub
GitHub - greenhandatsjtu/CVE-2022-0847-Container-Escape: CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty…
CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸 - GitHub - greenhandatsjtu/CVE-2022-0847-Container-Escape: CVE-2022-0847 used to achieve container escape 利用CVE-20...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon
URL:https://github.com/optiv/Registry-Recon
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon
URL:https://github.com/optiv/Registry-Recon
标签:#Cobalt Strike
GitHub
GitHub - optiv/Registry-Recon: Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon
Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon - optiv/Registry-Recon
GitHub监控消息提醒!!!
更新了:CVE-2022
描述:Désactivation du protocole MSDT URL (CVE-2022-30190) avec gestion des erreurs et de l'exit code pour un déploiement en masse
URL:https://github.com/Rojacur/FollinaPatcherCLI
标签:#CVE-2022
更新了:CVE-2022
描述:Désactivation du protocole MSDT URL (CVE-2022-30190) avec gestion des erreurs et de l'exit code pour un déploiement en masse
URL:https://github.com/Rojacur/FollinaPatcherCLI
标签:#CVE-2022
GitHub
GitHub - Rojacur/FollinaPatcherCLI: Désactivation du protocole MSDT URL (CVE-2022-30190) avec gestion des erreurs et de l'exit…
Désactivation du protocole MSDT URL (CVE-2022-30190) avec gestion des erreurs et de l'exit code pour un déploiement en masse - GitHub - Rojacur/FollinaPatcherCLI: Désactivation du protocole...
GitHub监控消息提醒!!!
更新了:Red Team
描述:AnyTeam - Red Team | Purple Team | Blue Team
URL:https://github.com/Anlominus/AnyTeam
标签:#Red Team
更新了:Red Team
描述:AnyTeam - Red Team | Purple Team | Blue Team
URL:https://github.com/Anlominus/AnyTeam
标签:#Red Team
GitHub
GitHub - AnLoMinus/AnyTeam: AnyTeam - Red Team | Purple Team | Blue Team
AnyTeam - Red Team | Purple Team | Blue Team. Contribute to AnLoMinus/AnyTeam development by creating an account on GitHub.