GitHub监控消息提醒!!!
更新了:RCE
描述:Modified RCE exploit for Lexmark CVE-2023-26067.
URL:https://github.com/RosePwns/Lexmark-RCE
标签:#RCE
更新了:RCE
描述:Modified RCE exploit for Lexmark CVE-2023-26067.
URL:https://github.com/RosePwns/Lexmark-RCE
标签:#RCE
GitHub
GitHub - Turbul3nce/Exploits: Modified or created exploits for assessments.
Modified or created exploits for assessments. Contribute to Turbul3nce/Exploits development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner.
URL:https://github.com/xaitax/CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner.
URL:https://github.com/xaitax/CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - xaitax/CVE-2024-23897: CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner.
CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. - GitHub - xaitax/CVE-2024-23897: CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner.
GitHub监控消息提醒!!!
更新了:webshell
描述:Snowpark container services container with a webshell
URL:https://github.com/sfc-gh-vtimofeenko/spcs-ttyd
标签:#webshell
更新了:webshell
描述:Snowpark container services container with a webshell
URL:https://github.com/sfc-gh-vtimofeenko/spcs-ttyd
标签:#webshell
GitHub
GitHub - sfc-gh-vtimofeenko/spcs-ttyd: Snowpark container services container with a webshell
Snowpark container services container with a webshell - sfc-gh-vtimofeenko/spcs-ttyd
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Scanner for CVE-2024-23897 - Jenkins
URL:https://github.com/yoryio/CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:Scanner for CVE-2024-23897 - Jenkins
URL:https://github.com/yoryio/CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - yoryio/CVE-2024-23897: Scanner for CVE-2024-23897 - Jenkins
Scanner for CVE-2024-23897 - Jenkins. Contribute to yoryio/CVE-2024-23897 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:GUI_TOOLS_Py7h0n_Win:一个自用及时迭代更新的win集成化武器库,快速融合基本渗透测试武器常用工具。
URL:https://github.com/ICML8/GUI_TOOLS_Py7h0n_Win
标签:#渗透测试
更新了:渗透测试
描述:GUI_TOOLS_Py7h0n_Win:一个自用及时迭代更新的win集成化武器库,快速融合基本渗透测试武器常用工具。
URL:https://github.com/ICML8/GUI_TOOLS_Py7h0n_Win
标签:#渗透测试
GitHub
GitHub - ICML8/GUI_TOOLS_Py7h0n_Win: GUI_TOOLS_Py7h0n_Win:一个自用及时迭代更新的win集成化武器库,快速融合基本渗透测试中的常用工具。节省环境配置时间,快速开箱使用。
GUI_TOOLS_Py7h0n_Win:一个自用及时迭代更新的win集成化武器库,快速融合基本渗透测试中的常用工具。节省环境配置时间,快速开箱使用。 - ICML8/GUI_TOOLS_Py7h0n_Win
GitHub监控消息提醒!!!
更新了:RCE
描述:Repo for SSRF & Path traversal & RCE exploit dreamhack wargame.
URL:https://github.com/Grantzile/exploit
标签:#RCE
更新了:RCE
描述:Repo for SSRF & Path traversal & RCE exploit dreamhack wargame.
URL:https://github.com/Grantzile/exploit
标签:#RCE
GitHub
GitHub - Grantzile/exploit: Repo for SSRF & Path traversal & RCE exploit dreamhack wargame.
Repo for SSRF & Path traversal & RCE exploit dreamhack wargame. - Grantzile/exploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23897 jenkins-cli
URL:https://github.com/CKevens/CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23897 jenkins-cli
URL:https://github.com/CKevens/CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - CKevens/CVE-2024-23897: CVE-2024-23897 jenkins-cli
CVE-2024-23897 jenkins-cli. Contribute to CKevens/CVE-2024-23897 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:on this git you can find all information on the CVE-2024-23897.
URL:https://github.com/iota4/PoC-jenkins-rce_CVE-2024-23897.
标签:#RCE
更新了:RCE
描述:on this git you can find all information on the CVE-2024-23897.
URL:https://github.com/iota4/PoC-jenkins-rce_CVE-2024-23897.
标签:#RCE
GitHub
GitHub - 10T4/PoC-Fix-jenkins-rce_CVE-2024-23897: on this git you can find all information on the CVE-2024-23897
on this git you can find all information on the CVE-2024-23897 - 10T4/PoC-Fix-jenkins-rce_CVE-2024-23897
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:on this git you can find all information on the CVE-2024-23897
URL:https://github.com/iota4/PoC-jenkins-rce_CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:on this git you can find all information on the CVE-2024-23897
URL:https://github.com/iota4/PoC-jenkins-rce_CVE-2024-23897
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-22515 arbitrary file upload and CVE-2024-22514 remote code execution for AgentDVR 5.1.6.0 (Authenticated)
URL:https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-22515 arbitrary file upload and CVE-2024-22514 remote code execution for AgentDVR 5.1.6.0 (Authenticated)
URL:https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution
标签:#CVE-2024
GitHub
GitHub - Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution: CVE-2024-22515 arbitrary file upload and CVE-2024-22514…
CVE-2024-22515 arbitrary file upload and CVE-2024-22514 remote code execution for AgentDVR 5.1.6.0 (Authenticated) - Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23897 - Jenkins 任意文件读取 利用工具
URL:https://github.com/wjlin0/fictional-engine
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23897 - Jenkins 任意文件读取 利用工具
URL:https://github.com/wjlin0/fictional-engine
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23897 - Jenkins 任意文件读取 利用工具
URL:https://github.com/wjlin0/CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23897 - Jenkins 任意文件读取 利用工具
URL:https://github.com/wjlin0/CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - wjlin0/CVE-2024-23897: CVE-2024-23897 - Jenkins 任意文件读取 利用工具
CVE-2024-23897 - Jenkins 任意文件读取 利用工具. Contribute to wjlin0/CVE-2024-23897 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This repository presents a proof-of-concept of CVE-2024-23897
URL:https://github.com/Vozec/CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:This repository presents a proof-of-concept of CVE-2024-23897
URL:https://github.com/Vozec/CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - Vozec/CVE-2024-23897: This repository presents a proof-of-concept of CVE-2024-23897
This repository presents a proof-of-concept of CVE-2024-23897 - Vozec/CVE-2024-23897
GitHub监控消息提醒!!!
更新了:渗透测试
描述:该工具是一个集成了非常多渗透测试工具,类似软件商城的工具可以进行工具下载,工具的更新,工具编写了自动化的安装脚本,不用担心工具跑不起来。
URL:https://github.com/CuriousLearnerDev/Online_tools
标签:#渗透测试
更新了:渗透测试
描述:该工具是一个集成了非常多渗透测试工具,类似软件商城的工具可以进行工具下载,工具的更新,工具编写了自动化的安装脚本,不用担心工具跑不起来。
URL:https://github.com/CuriousLearnerDev/Online_tools
标签:#渗透测试
GitHub
GitHub - CuriousLearnerDev/Online_tools: 该工具专为运维和安全检查和学生研究设计,类似于软件商城,可以实现工具下载、更新,并提供自动化安装脚本。对于信息安全专业的学生而言,不用担心工具无法正常运行配置,提升学生学习效率。
该工具专为运维和安全检查和学生研究设计,类似于软件商城,可以实现工具下载、更新,并提供自动化安装脚本。对于信息安全专业的学生而言,不用担心工具无法正常运行配置,提升学生学习效率。 - CuriousLearnerDev/Online_tools
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23897
URL:https://github.com/raheel0x01/CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23897
URL:https://github.com/raheel0x01/CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - r0xdeadbeef/CVE-2024-23897: Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command…
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with th...
GitHub监控消息提醒!!!
更新了:RCE
描述:Work from 2018 on Remote Code Execution in Pokemon Crystal. The RCE itself works, but the project built around it was never completed.
URL:https://github.com/MrCheeze/pokecrystal-ace
标签:#RCE
更新了:RCE
描述:Work from 2018 on Remote Code Execution in Pokemon Crystal. The RCE itself works, but the project built around it was never completed.
URL:https://github.com/MrCheeze/pokecrystal-ace
标签:#RCE
GitHub
GitHub - MrCheeze/pokecrystal-ace: Work from 2018 on Remote Code Execution in Pokemon Crystal. The RCE itself works, but the project…
Work from 2018 on Remote Code Execution in Pokemon Crystal. The RCE itself works, but the project built around it was never completed. - GitHub - MrCheeze/pokecrystal-ace: Work from 2018 on Remote ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Arbitrary file read vulnerability through the CLI can lead to RCE
URL:https://github.com/viszsec/CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:Arbitrary file read vulnerability through the CLI can lead to RCE
URL:https://github.com/viszsec/CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - viszsec/CVE-2024-23897: Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE
Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE - viszsec/CVE-2024-23897
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:Struts2全版本漏洞检测工具 by:ABC_123
URL:https://github.com/abc123info/Struts2VulsScanTools
标签:#漏洞检测
更新了:漏洞检测
描述:Struts2全版本漏洞检测工具 by:ABC_123
URL:https://github.com/abc123info/Struts2VulsScanTools
标签:#漏洞检测
GitHub
GitHub - abc123info/Struts2VulsScanTools: 1、点击“检测漏洞”,会自动检测该URL是否存在S2-001、S2-005、S2-009、S2-013、S2-016、S2-019、S2-020/021、S2-032、S2…
1、点击“检测漏洞”,会自动检测该URL是否存在S2-001、S2-005、S2-009、S2-013、S2-016、S2-019、S2-020/021、S2-032、S2-037、DevMode、S2-045/046、S2-052、S2-048、S2-053、S2-057、S2-061、S2相关log4j2十余种漏洞。 2、“批量验证”,(为防止批量geshell,此功能已经删除,并不再...
GitHub监控消息提醒!!!
更新了:权限提升
描述:Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
URL:https://github.com/coldpon/elevationTool
标签:#权限提升
更新了:权限提升
描述:Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
URL:https://github.com/coldpon/elevationTool
标签:#权限提升
GitHub
GitHub - coldpon/elevationTool: Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller - coldpon/elevationTool