GitHub监控消息提醒!!!
更新了:攻防
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/AJCDN003/glowing-disco
标签:#攻防
更新了:攻防
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/AJCDN003/glowing-disco
标签:#攻防
GitHub
GitHub - AJCDN003/glowing-disco: 🔝1、最优的安全计划建议:VPN+跳板机系统+工作服务器/工作VPS 💻2、CDN(无限抗/非绕美/本地抗/国内加速) 免实名可测试 🌏3、香港/新加坡/美国云服务器 免实名可测试 🏢4、国内免备案服务器…
🔝1、最优的安全计划建议:VPN+跳板机系统+工作服务器/工作VPS 💻2、CDN(无限抗/非绕美/本地抗/国内加速) 免实名可测试 🌏3、香港/新加坡/美国云服务器 免实名可测试 🏢4、国内免备案服务器 免实名不可测 🔒5、高防服务器 免实名可测试 🍀6、香港/美国/国内显卡服务器 免实名可测试 🌐7、海外专线服务器 免实名可测试 📦8、发包服务器/可伪造可放大 免实名不可测 🛡️9、游戏...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:南明离火,渗透测试,APK反编译,APK分析工具,安卓沙箱,APK分析网站,APK在线分析,查诈骗APP,查病毒APP,隐私合规,安全漏洞,广告欺诈,恶意行为,免费APK分析,手机APK代码分析,APK取证分析
URL:https://github.com/XiaomingX/Pentest_POC_Collection
标签:#渗透测试
更新了:渗透测试
描述:南明离火,渗透测试,APK反编译,APK分析工具,安卓沙箱,APK分析网站,APK在线分析,查诈骗APP,查病毒APP,隐私合规,安全漏洞,广告欺诈,恶意行为,免费APK分析,手机APK代码分析,APK取证分析
URL:https://github.com/XiaomingX/Pentest_POC_Collection
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:1. 测试CVE-2024-10220
URL:https://github.com/phoenixmerk/CVE-2024-10220-test-case
标签:#CVE-2024
更新了:CVE-2024
描述:1. 测试CVE-2024-10220
URL:https://github.com/phoenixmerk/CVE-2024-10220-test-case
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:渗透测试
描述:旨在帮助在技术人员在日常渗透测试或攻防演练中对于漏洞及指纹的积累,形成自己强大的漏洞库及指纹库。相比于nuclei脚本可能会相对无脑简化!且采用GUI设置,使用起来也更加方便!
URL:https://github.com/vsdwef/James_synthesis_tooL
标签:#渗透测试
更新了:渗透测试
描述:旨在帮助在技术人员在日常渗透测试或攻防演练中对于漏洞及指纹的积累,形成自己强大的漏洞库及指纹库。相比于nuclei脚本可能会相对无脑简化!且采用GUI设置,使用起来也更加方便!
URL:https://github.com/vsdwef/James_synthesis_tooL
标签:#渗透测试
GitHub
GitHub - vsdwef/James_synthesis_tooL: 旨在帮助技术人员在日常渗透测试或攻防演练中对于漏洞及指纹的积累,形成自己强大的漏洞库及指纹库。相比于nuclei脚本可能会相对无脑简化!且采用GUI设置,使用起来也更加方便!
旨在帮助技术人员在日常渗透测试或攻防演练中对于漏洞及指纹的积累,形成自己强大的漏洞库及指纹库。相比于nuclei脚本可能会相对无脑简化!且采用GUI设置,使用起来也更加方便! - vsdwef/James_synthesis_tooL
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:从0基础入门prompt设计到越狱全链路的参考手册,带你打造Ai辅助漏洞挖掘助手,实战越狱成功openai,谷歌,微软,克劳德,perplexity,poe,meta,腾讯,百度,阿里,字节,kimi等一线模型,项目初持续更新,喜欢可以点点star,拜谢诸君
URL:https://github.com/shanshanerxi/prompt-
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:从0基础入门prompt设计到越狱全链路的参考手册,带你打造Ai辅助漏洞挖掘助手,实战越狱成功openai,谷歌,微软,克劳德,perplexity,poe,meta,腾讯,百度,阿里,字节,kimi等一线模型,项目初持续更新,喜欢可以点点star,拜谢诸君
URL:https://github.com/shanshanerxi/prompt-
标签:#漏洞挖掘
GitHub监控消息提醒!!!
更新了:Red Team
描述:A Red Team Activity Hub
URL:https://github.com/rajkumar-vishe/rajkumar-vishe-Automated-Adversarial-Emulation-Framework
标签:#Red Team
更新了:Red Team
描述:A Red Team Activity Hub
URL:https://github.com/rajkumar-vishe/rajkumar-vishe-Automated-Adversarial-Emulation-Framework
标签:#Red Team
GitHub
GitHub - rajkumar-vishe/rajkumar-vishe-Automated-Adversarial-Emulation-Framework: The Automated Adversarial Emulation Framework…
The Automated Adversarial Emulation Framework is an open-source project designed to automate red team cybersecurity operations. It includes modules for network reconnaissance, exploiting vulnerabil...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.
URL:https://github.com/Patrick-DE/C2-logparser
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.
URL:https://github.com/Patrick-DE/C2-logparser
标签:#Cobalt Strike
GitHub
GitHub - Patrick-DE/C2-logparser: Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used…
Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports. - Patrick-DE/C2-logparser
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! - boku7/BokuLoader
URL:https://github.com/Hunobas/tgfae
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! - boku7/BokuLoader
URL:https://github.com/Hunobas/tgfae
标签:#Cobalt Strike
GitHub
GitHub - Hunobas/tgfae: A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt…
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! - boku7/BokuLoader - Hunobas/tgfae
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-9659: Unrestricted Upload of File with Dangerous Type (CWE-434)
URL:https://github.com/zetraxz/CVE-2024-9659
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-9659: Unrestricted Upload of File with Dangerous Type (CWE-434)
URL:https://github.com/zetraxz/CVE-2024-9659
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:poc-CVE-2024-5057
URL:https://github.com/g1thubb004/poc-CVE-2024-5057
标签:#CVE-2024
更新了:CVE-2024
描述:poc-CVE-2024-5057
URL:https://github.com/g1thubb004/poc-CVE-2024-5057
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Red Team
描述:Collection of tools, code samples, and documentation to assist in AI Red Teaming
URL:https://github.com/aexcode/airt
标签:#Red Team
更新了:Red Team
描述:Collection of tools, code samples, and documentation to assist in AI Red Teaming
URL:https://github.com/aexcode/airt
标签:#Red Team
GitHub
GitHub - aexcode/airt: Collection of tools, code samples, and documentation to assist in AI Red Teaming
Collection of tools, code samples, and documentation to assist in AI Red Teaming - aexcode/airt
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.
URL:https://github.com/XiaomingX/cve-2024-51567-poc
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.
URL:https://github.com/XiaomingX/cve-2024-51567-poc
标签:#CVE-2024
GitHub
GitHub - XiaomingX/cve-2024-51567-poc: CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s…
CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections. - XiaomingX/cve-2024-51567-poc
GitHub监控消息提醒!!!
更新了:Red Team
描述:Interview Preparation for VATP || Penetration Testing ( Web, Mobile, API etc) || Cloud || SOC || Red Teaming || DevSecOps
URL:https://github.com/m14r41/CyberSecurity-Interview
标签:#Red Team
更新了:Red Team
描述:Interview Preparation for VATP || Penetration Testing ( Web, Mobile, API etc) || Cloud || SOC || Red Teaming || DevSecOps
URL:https://github.com/m14r41/CyberSecurity-Interview
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Event Tickets with Ticket Scanner WordPress 플러그인(CVE-2024-52427)의 불완전 패치 발견 및 권한 격하(Author → Contributor) 취약점 분석
URL:https://github.com/DoTTak/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report
标签:#CVE-2024
更新了:CVE-2024
描述:Event Tickets with Ticket Scanner WordPress 플러그인(CVE-2024-52427)의 불완전 패치 발견 및 권한 격하(Author → Contributor) 취약점 분석
URL:https://github.com/DoTTak/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team tools weaponized
URL:https://github.com/sneakerhax/Arsenal
标签:#Red Team
更新了:Red Team
描述:Red Team tools weaponized
URL:https://github.com/sneakerhax/Arsenal
标签:#Red Team
GitHub
GitHub - sneakerhax/Arsenal: Red Team tools weaponized
Red Team tools weaponized. Contribute to sneakerhax/Arsenal development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/jeecgboot/JeecgBoot
标签:#代码注入
更新了:代码注入
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/jeecgboot/JeecgBoot
标签:#代码注入
GitHub
GitHub - jeecgboot/JeecgBoot: 🔥一款基于AIGC和低代码引擎的AI低代码平台,旨在帮助企业快速实现低代码开发和构建、部署个性化的 AI 应用。 前后端分离 SpringBoot,SpringCloud,Ant Design…
🔥一款基于AIGC和低代码引擎的AI低代码平台,旨在帮助企业快速实现低代码开发和构建、部署个性化的 AI 应用。 前后端分离 SpringBoot,SpringCloud,Ant Design&Vue3,Mybatis,Shiro!强大的代码生成器让前后端代码一键生成,无需写任何代码! 成套AI大模型功能: AI模型管理、AI应用、知识库、AI流程编排、AI对话助手等; - ...
GitHub监控消息提醒!!!
更新了:bypassav
描述:免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
URL:https://github.com/aeverj/NimShellCodeLoader
标签:#bypassav
更新了:bypassav
描述:免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
URL:https://github.com/aeverj/NimShellCodeLoader
标签:#bypassav
GitHub
GitHub - aeverj/NimShellCodeLoader: 免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器 - aeverj/NimShellCodeLoader