GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887
URL:https://github.com/TheRedDevil1/Check-Vulns-Script
标签:#CVE-2024
更新了:CVE-2024
描述:Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887
URL:https://github.com/TheRedDevil1/Check-Vulns-Script
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:反序列化
描述:这是一个简易RPC框架的实现,主要实现功能有:1、注册中心;2、序列化与反序列化;3、传输协议;4、网络传输;5、动态代理;6、负载均衡
URL:https://github.com/JNU-CZH/simple-rpc-framework
标签:#反序列化
更新了:反序列化
描述:这是一个简易RPC框架的实现,主要实现功能有:1、注册中心;2、序列化与反序列化;3、传输协议;4、网络传输;5、动态代理;6、负载均衡
URL:https://github.com/JNU-CZH/simple-rpc-framework
标签:#反序列化
GitHub
GitHub - JNU-CZH/simple-rpc-framework: 这是一个简易RPC框架的实现,主要实现功能有:1、注册中心;2、序列化与反序列化;3、传输协议;4、网络传输;5、动态代理;6、负载均衡
这是一个简易RPC框架的实现,主要实现功能有:1、注册中心;2、序列化与反序列化;3、传输协议;4、网络传输;5、动态代理;6、负载均衡 - GitHub - JNU-CZH/simple-rpc-framework: 这是一个简易RPC框架的实现,主要实现功能有:1、注册中心;2、序列化与反序列化;3、传输协议;4、网络传输;5、动态代理;6、负载均衡
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:Yet another C++ Cobalt Strike beacon dropper with Ntdll unhooking, PPID spoofing and custom Process hollowing
URL:https://github.com/ProcessusT/Venoma
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:Yet another C++ Cobalt Strike beacon dropper with Ntdll unhooking, PPID spoofing and custom Process hollowing
URL:https://github.com/ProcessusT/Venoma
标签:#bypass AntiVirus
GitHub
GitHub - ProcessusT/Venoma: Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls…
Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution - ProcessusT/Venoma
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-22416 exploit experiments
URL:https://github.com/mindstorm38/ensimag-secu3a-cve-2024-22416
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-22416 exploit experiments
URL:https://github.com/mindstorm38/ensimag-secu3a-cve-2024-22416
标签:#CVE-2024
GitHub
GitHub - mindstorm38/ensimag-secu3a-cve-2024-22416: CVE-2024-22416 exploit experiments
CVE-2024-22416 exploit experiments. Contribute to mindstorm38/ensimag-secu3a-cve-2024-22416 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A lab to check if SQL Injection can be used by RCE that download file through cloud NAT.
URL:https://github.com/codeshin129/rce-lab
标签:#RCE
更新了:RCE
描述:A lab to check if SQL Injection can be used by RCE that download file through cloud NAT.
URL:https://github.com/codeshin129/rce-lab
标签:#RCE
GitHub
GitHub - codeshin129/rce-lab: A lab to check if SQL Injection can be used by RCE that download file through cloud NAT.
A lab to check if SQL Injection can be used by RCE that download file through cloud NAT. - GitHub - codeshin129/rce-lab: A lab to check if SQL Injection can be used by RCE that download file throug...
GitHub监控消息提醒!!!
更新了:webshell
描述:My personal php webshell
URL:https://github.com/20520545/simple_php_lfi
标签:#webshell
更新了:webshell
描述:My personal php webshell
URL:https://github.com/20520545/simple_php_lfi
标签:#webshell
GitHub
GitHub - 20520545/simple_php_lfi: My personal php webshell
My personal php webshell. Contribute to 20520545/simple_php_lfi development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike Profiles for EDR Evasion
URL:https://github.com/EvilGreys/Cobalt-Strike-Profiles-for-EDR-Evasion
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike Profiles for EDR Evasion
URL:https://github.com/EvilGreys/Cobalt-Strike-Profiles-for-EDR-Evasion
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Ivanti Connect Around attack chain mitigation validation tool. CVE-2023-46805 and CVE-2024-21887.
URL:https://github.com/seajaysec/Ivanti-Connect-Around-Scan
标签:#CVE-2024
更新了:CVE-2024
描述:Ivanti Connect Around attack chain mitigation validation tool. CVE-2023-46805 and CVE-2024-21887.
URL:https://github.com/seajaysec/Ivanti-Connect-Around-Scan
标签:#CVE-2024
GitHub
GitHub - seajaysec/Ivanti-Connect-Around-Scan: Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple…
Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887. - seajaysec/Ivanti-Connect-Around-Scan
GitHub监控消息提醒!!!
更新了:RCE
描述:Dompdf RCE PoC Exploit - CVE-2022-28368
URL:https://github.com/rvizx/CVE-2022-28368
标签:#RCE
更新了:RCE
描述:Dompdf RCE PoC Exploit - CVE-2022-28368
URL:https://github.com/rvizx/CVE-2022-28368
标签:#RCE
GitHub
GitHub - rvizx/CVE-2022-28368: Dompdf RCE PoC Exploit - CVE-2022-28368
Dompdf RCE PoC Exploit - CVE-2022-28368. Contribute to rvizx/CVE-2022-28368 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:使用分支对抗技术制作的PHP Webshell,截止2024年1月18日,共数十个查杀引擎免杀
URL:https://github.com/icewolf-sec/PerlinPuzzle-Webshell-PHP
标签:#免杀
更新了:免杀
描述:使用分支对抗技术制作的PHP Webshell,截止2024年1月18日,共数十个查杀引擎免杀
URL:https://github.com/icewolf-sec/PerlinPuzzle-Webshell-PHP
标签:#免杀
GitHub
GitHub - misaka19008/PerlinPuzzle-Webshell-PHP: 使用分支对抗技术制作的PHP Webshell,截止2024年1月18日,共数十个查杀引擎免杀
使用分支对抗技术制作的PHP Webshell,截止2024年1月18日,共数十个查杀引擎免杀. Contribute to misaka19008/PerlinPuzzle-Webshell-PHP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Writeup of a heap overflow vulnerability in the GNU coreutils split program. CVE-2024-0684
URL:https://github.com/Valentin-Metz/writeup_split
标签:#CVE-2024
更新了:CVE-2024
描述:Writeup of a heap overflow vulnerability in the GNU coreutils split program. CVE-2024-0684
URL:https://github.com/Valentin-Metz/writeup_split
标签:#CVE-2024
GitHub
GitHub - Valentin-Metz/writeup_split: Writeup of a heap overflow vulnerability in the GNU coreutils split program. CVE-2024-0684
Writeup of a heap overflow vulnerability in the GNU coreutils split program. CVE-2024-0684 - Valentin-Metz/writeup_split
GitHub监控消息提醒!!!
更新了:RCE
描述:Um Script python para uma falha de Blind RCE
URL:https://github.com/Rotramo/IPFire-2.19-x86_64---Core-Update-109-Blind-RCE
标签:#RCE
更新了:RCE
描述:Um Script python para uma falha de Blind RCE
URL:https://github.com/Rotramo/IPFire-2.19-x86_64---Core-Update-109-Blind-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Um Script python para uma falha de Blind RCE
URL:https://github.com/Lucashbsobrinho/IPFire-2.19-x86_64---Core-Update-109-Blind-RCE
标签:#RCE
更新了:RCE
描述:Um Script python para uma falha de Blind RCE
URL:https://github.com/Lucashbsobrinho/IPFire-2.19-x86_64---Core-Update-109-Blind-RCE
标签:#RCE
GitHub
GitHub - Lucashbsobrinho/IPFire-2.19-x86_64---Core-Update-109-Blind-RCE: Um Script python para uma falha de Blind RCE
Um Script python para uma falha de Blind RCE. Contribute to Lucashbsobrinho/IPFire-2.19-x86_64---Core-Update-109-Blind-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:projectworlds' Online Admission System RCE vulnerability PoC
URL:https://github.com/keru6k/Online-Admission-System-RCE-PoC
标签:#RCE
更新了:RCE
描述:projectworlds' Online Admission System RCE vulnerability PoC
URL:https://github.com/keru6k/Online-Admission-System-RCE-PoC
标签:#RCE
GitHub
GitHub - keru6k/Online-Admission-System-RCE-PoC: projectworlds' Online Admission System RCE vulnerability PoC, Categorized as CVE…
projectworlds' Online Admission System RCE vulnerability PoC, Categorized as CVE-2024-0783 - keru6k/Online-Admission-System-RCE-PoC
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-20656
URL:https://github.com/xiaoqiao147/CVE-2024-20654
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-20656
URL:https://github.com/xiaoqiao147/CVE-2024-20654
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:免杀
描述:通过远程加载AES + XOR异或加密shellcode的免杀加载器,无过多技术细节。
URL:https://github.com/Mangofang/BypassLoad
标签:#免杀
更新了:免杀
描述:通过远程加载AES + XOR异或加密shellcode的免杀加载器,无过多技术细节。
URL:https://github.com/Mangofang/BypassLoad
标签:#免杀
GitHub
GitHub - Mangofang/BypassLoad: shellcode免杀加载器,过主流杀软
shellcode免杀加载器,过主流杀软. Contribute to Mangofang/BypassLoad development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-20656
URL:https://github.com/xiaoqiao147/CVE-2024-22222
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-20656
URL:https://github.com/xiaoqiao147/CVE-2024-22222
标签:#CVE-2024