GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Mind Map
URL:https://github.com/redhat-cop/automation-good-practices
更新了:Red Team
描述:Red Team Mind Map
URL:https://github.com/redhat-cop/automation-good-practices
GitHub
GitHub - redhat-cop/automation-good-practices: Recommended practices for all elements of automation using Ansible, starting with…
Recommended practices for all elements of automation using Ansible, starting with collections and roles, continuing with playbooks, inventories and plug-ins... These good practices are planned to b...
GitHub监控消息提醒!!!
更新了:Exploit
描述:Yet another Werkzeug Console Pin Exploit Explanation
URL:https://github.com/grav3m1nd-byte/werkzeug-pin
更新了:Exploit
描述:Yet another Werkzeug Console Pin Exploit Explanation
URL:https://github.com/grav3m1nd-byte/werkzeug-pin
GitHub
GitHub - grav3m1nd-byte/werkzeug-pin: Yet another Werkzeug Console Pin Exploit Explanation
Yet another Werkzeug Console Pin Exploit Explanation - grav3m1nd-byte/werkzeug-pin
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploit for nostromo <= 1.9.6. This exploit has the functionality of being able to have an pseudo shell
URL:https://github.com/c0rnf13ld/nostromo-exploit-integrated-pseudoshell
更新了:Exploit
描述:Exploit for nostromo <= 1.9.6. This exploit has the functionality of being able to have an pseudo shell
URL:https://github.com/c0rnf13ld/nostromo-exploit-integrated-pseudoshell
GitHub
GitHub - c0rnf13ld/nostromo-exploit-pseudoshell: Exploit for nostromo <= 1.9.6. This exploit has the functionality of being able…
Exploit for nostromo <= 1.9.6. This exploit has the functionality of being able to have an pseudo shell - GitHub - c0rnf13ld/nostromo-exploit-pseudoshell: Exploit for nostromo <= 1.9....
GitHub监控消息提醒!!!
更新了:Exploit
描述:Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
URL:https://github.com/v3n0m-Scanner/V3n0M-Scanner
更新了:Exploit
描述:Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
URL:https://github.com/v3n0m-Scanner/V3n0M-Scanner
GitHub
GitHub - v3n0m-Scanner/V3n0M-Scanner: Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns - v3n0m-Scanner/V3n0M-Scanner
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploiting Fast LCF and BERT for Aspect-based Sentiment Analysis (Official Implementation of LCF-BERT)
URL:https://github.com/christianhacks/SPYthon_Web-App
更新了:Exploit
描述:Exploiting Fast LCF and BERT for Aspect-based Sentiment Analysis (Official Implementation of LCF-BERT)
URL:https://github.com/christianhacks/SPYthon_Web-App
GitHub
GitHub - christianhacks/SPYthon_Web-App: The idea for this project is to create a multithreaded Python server that will generate…
The idea for this project is to create a multithreaded Python server that will generate HTML reports on what exploits can be run against a host. The project has two versions. There is a command lin...
GitHub监控消息提醒!!!
更新了:Blue Team
描述:Blue Team Assessment done as my second project while attending the Cyber Security Bootcamp at UT Austin
URL:https://github.com/MadT3ch/UTA-Blue-Team-Assesment
更新了:Blue Team
描述:Blue Team Assessment done as my second project while attending the Cyber Security Bootcamp at UT Austin
URL:https://github.com/MadT3ch/UTA-Blue-Team-Assesment
GitHub
GitHub - MadT3ch/UTA-Blue-Team-Assesment: Blue Team Assessment done as my second project while attending the Cyber Security Bootcamp…
Blue Team Assessment done as my second project while attending the Cyber Security Bootcamp at UT Austin - GitHub - MadT3ch/UTA-Blue-Team-Assesment: Blue Team Assessment done as my second project wh...
GitHub监控消息提醒!!!
更新了:红队
描述:一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
URL:https://github.com/kelvinBen/AppInfoScanner
更新了:红队
描述:一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
URL:https://github.com/kelvinBen/AppInfoScanner
GitHub
GitHub - kelvinBen/AppInfoScanner: 一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端…
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。 - kelvinBen/AppInfoScanner
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-36934 PowerShell Fix
URL:https://github.com/tda90/CVE-2021-36934
更新了:CVE-2021
描述:CVE-2021-36934 PowerShell Fix
URL:https://github.com/tda90/CVE-2021-36934
GitHub
GitHub - tda90/CVE-2021-36934: CVE-2021-36934 PowerShell Fix
CVE-2021-36934 PowerShell Fix. Contribute to tda90/CVE-2021-36934 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:shellcode
描述:Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
URL:https://github.com/hasherezade/pe-sieve
更新了:shellcode
描述:Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
URL:https://github.com/hasherezade/pe-sieve
GitHub
GitHub - hasherezade/pe-sieve: Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected…
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches). - hasherezade/pe-sieve
GitHub监控消息提醒!!!
更新了:shellcode
描述:Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
URL:https://github.com/hasherezade/hollows_hunter
更新了:shellcode
描述:Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
URL:https://github.com/hasherezade/hollows_hunter
GitHub
GitHub - hasherezade/hollows_hunter: Scans all running processes. Recognizes and dumps a variety of potentially malicious implants…
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches). - hasherezade/hollows_hunter
GitHub监控消息提醒!!!
更新了:shellcode
描述:sc4cpp is a shellcode framework based on C++
URL:https://github.com/windpiaoxue/sc4cpp
更新了:shellcode
描述:sc4cpp is a shellcode framework based on C++
URL:https://github.com/windpiaoxue/sc4cpp
GitHub
GitHub - windpiaoxue/sc4cpp: sc4cpp is a shellcode framework based on C++
sc4cpp is a shellcode framework based on C++. Contribute to windpiaoxue/sc4cpp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Exploit
描述:CISCO CVE-2020-3452 Scanner & Exploiter
URL:https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter
更新了:Exploit
描述:CISCO CVE-2020-3452 Scanner & Exploiter
URL:https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter
GitHub
GitHub - darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter: CISCO CVE-2020-3452 Scanner & Exploiter
CISCO CVE-2020-3452 Scanner & Exploiter. Contribute to darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Proof of concept for CVE-2021-27965 (Stack-based Buffer Overflow)
URL:https://github.com/Crystalware/CVE-2021-27965
更新了:CVE-2021
描述:Proof of concept for CVE-2021-27965 (Stack-based Buffer Overflow)
URL:https://github.com/Crystalware/CVE-2021-27965
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploiting a buffer overflow vulnerability with ROP chains.
URL:https://github.com/kavishkagihan/ROP-Buffer-overflow
更新了:Exploit
描述:Exploiting a buffer overflow vulnerability with ROP chains.
URL:https://github.com/kavishkagihan/ROP-Buffer-overflow
GitHub
GitHub - kavishkagihan/ROP-Buffer-overflow: Exploiting a buffer overflow vulnerability with ROP chains.
Exploiting a buffer overflow vulnerability with ROP chains. - GitHub - kavishkagihan/ROP-Buffer-overflow: Exploiting a buffer overflow vulnerability with ROP chains.