GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploitation of security vulnerabilities found in poorly designed token-weighted governance protocols, using AAVE flash loans to gain unfair voting power.
URL:https://github.com/Elisik/Token-Weighted-Governance-Security-Exploit-Using-AAVE-Flash-Loans
更新了:Exploit
描述:Exploitation of security vulnerabilities found in poorly designed token-weighted governance protocols, using AAVE flash loans to gain unfair voting power.
URL:https://github.com/Elisik/Token-Weighted-Governance-Security-Exploit-Using-AAVE-Flash-Loans
GitHub
GitHub - Elisik/Token-Weighted-Governance-Security-Exploit-Using-AAVE-Flash-Loans: Exploitation of security vulnerabilities found…
Exploitation of security vulnerabilities found in poorly designed token-weighted governance protocols, using AAVE flash loans to gain unfair voting power. - GitHub - Elisik/Token-Weighted-Governanc...
GitHub监控消息提醒!!!
更新了:Exploit
描述:C2X - C2/Post-Exploitation Tool For Red Teaming and Ethical Hacking
URL:https://github.com/nxenon/c2x
更新了:Exploit
描述:C2X - C2/Post-Exploitation Tool For Red Teaming and Ethical Hacking
URL:https://github.com/nxenon/c2x
GitHub
GitHub - nxenon/c2x: C2X - C2/Post-Exploitation Tool on (Raw Socket Traffic)
C2X - C2/Post-Exploitation Tool on (Raw Socket Traffic) - GitHub - nxenon/c2x: C2X - C2/Post-Exploitation Tool on (Raw Socket Traffic)
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A Powrshell script to scan for CVE-2021-34470
URL:https://github.com/technion/CVE-2021-34470scanner
更新了:CVE-2021
描述:A Powrshell script to scan for CVE-2021-34470
URL:https://github.com/technion/CVE-2021-34470scanner
GitHub
GitHub - technion/CVE-2021-34470scanner: A Powrshell script to scan for CVE-2021-34470
A Powrshell script to scan for CVE-2021-34470. Contribute to technion/CVE-2021-34470scanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Exploit
描述:Flask Exploit for ROBLOX
URL:https://github.com/FlaskExploits/Flask-Update-Patch
更新了:Exploit
描述:Flask Exploit for ROBLOX
URL:https://github.com/FlaskExploits/Flask-Update-Patch
GitHub
GitHub - FlaskExploits/Flask-Update-Patch: Flask Exploit for ROBLOX
Flask Exploit for ROBLOX. Contribute to FlaskExploits/Flask-Update-Patch development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:Java安全相关的漏洞和技术demo,原生Java、Fastjson、Jackson、Hessian2、XML反序列化漏洞利用和Spring、Dubbo、Shiro、CAS、Tomcat、RMI、Nexus等框架\\中间件\\功能的exploits以及Java Security Manager绕过、Dubbo-Hessian2安全加固等等实践代码。
URL:https://github.com/threedr3am/learnjavabug
更新了:漏洞利用
描述:Java安全相关的漏洞和技术demo,原生Java、Fastjson、Jackson、Hessian2、XML反序列化漏洞利用和Spring、Dubbo、Shiro、CAS、Tomcat、RMI、Nexus等框架\\中间件\\功能的exploits以及Java Security Manager绕过、Dubbo-Hessian2安全加固等等实践代码。
URL:https://github.com/threedr3am/learnjavabug
GitHub
GitHub - threedr3am/learnjavabug: Java安全相关的漏洞和技术demo,原生Java、Fastjson、Jackson、Hessian2、XML反序列化漏洞利用和Spring、Dubbo、Shiro、CAS、Tomca…
Java安全相关的漏洞和技术demo,原生Java、Fastjson、Jackson、Hessian2、XML反序列化漏洞利用和Spring、Dubbo、Shiro、CAS、Tomcat、RMI、Nexus等框架\中间件\功能的exploits以及Java Security Manager绕过、Dubbo-Hessian2安全加固等等实践代码。 - threedr3am/learnjavabug
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A Powrshell script to scan for CVE-2021-34470
URL:https://github.com/Yang0615777/PocList
更新了:CVE-2021
描述:A Powrshell script to scan for CVE-2021-34470
URL:https://github.com/Yang0615777/PocList
GitHub
GitHub - 1n7erface/PocList: Alibaba-Nacos-Unauthorized/ApacheDruid-RCE_CVE-2021-25646/MS-Exchange-SSRF-CVE-2021-26885/Oracle-WebLogic…
Alibaba-Nacos-Unauthorized/ApacheDruid-RCE_CVE-2021-25646/MS-Exchange-SSRF-CVE-2021-26885/Oracle-WebLogic-CVE-2021-2109_RCE/RG-CNVD-2021-14536/RJ-SSL-VPN-UltraVires/Redis-Unauthorized-RCE/TDOA-V11....
GitHub监控消息提醒!!!
更新了:Exploit
描述:The official Exploit Database repository
URL:https://github.com/SudiptaSaha17/Siamese_Neural_Network_voice_verification
更新了:Exploit
描述:The official Exploit Database repository
URL:https://github.com/SudiptaSaha17/Siamese_Neural_Network_voice_verification
GitHub监控消息提醒!!!
更新了:免杀
描述:一个webshell管理工具,支持JSP、PHP,免杀,过WAF,过NIDS。用于学习,研究使用
URL:https://github.com/njcx/gomoon
更新了:免杀
描述:一个webshell管理工具,支持JSP、PHP,免杀,过WAF,过NIDS。用于学习,研究使用
URL:https://github.com/njcx/gomoon
GitHub
GitHub - njcx/gomoon: 一个webshell管理工具,支持JSP、PHP,免杀,过WAF,过NIDS。用于学习,研究使用
一个webshell管理工具,支持JSP、PHP,免杀,过WAF,过NIDS。用于学习,研究使用. Contribute to njcx/gomoon development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Exploit
描述:How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys
URL:https://github.com/stong/CVE-2020-15368
更新了:Exploit
描述:How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys
URL:https://github.com/stong/CVE-2020-15368
GitHub
GitHub - stong/CVE-2020-15368: CVE-2020-15368, aka "How to exploit a vulnerable driver"
CVE-2020-15368, aka "How to exploit a vulnerable driver" - stong/CVE-2020-15368
GitHub监控消息提醒!!!
更新了:Exploit
描述:Night King 7.55FW Host Exploit With Mixed Auto mode PRB-Borg and DarkmodderVC
URL:https://github.com/Night-King-Host/755Auto
更新了:Exploit
描述:Night King 7.55FW Host Exploit With Mixed Auto mode PRB-Borg and DarkmodderVC
URL:https://github.com/Night-King-Host/755Auto
GitHub
GitHub - Night-King-Host/755Auto: Night King 7.55FW Host Exploit With Mixed Auto mode PRB-Borg and DarkmodderVC
Night King 7.55FW Host Exploit With Mixed Auto mode PRB-Borg and DarkmodderVC - GitHub - Night-King-Host/755Auto: Night King 7.55FW Host Exploit With Mixed Auto mode PRB-Borg and DarkmodderVC
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploit woocommerce SQLI and grab user and password hash
URL:https://github.com/RandomRobbieBF/woo
更新了:Exploit
描述:Exploit woocommerce SQLI and grab user and password hash
URL:https://github.com/RandomRobbieBF/woo
GitHub
GitHub - RandomRobbieBF/woo: Exploit woocommerce SQLI and grab user and password hash
Exploit woocommerce SQLI and grab user and password hash - RandomRobbieBF/woo
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploiting open data to assess accessibility of transportation in Paris region
URL:https://github.com/SofianeKal/Accessibility-IDF
更新了:Exploit
描述:Exploiting open data to assess accessibility of transportation in Paris region
URL:https://github.com/SofianeKal/Accessibility-IDF
GitHub
GitHub - SofianeKal/Accessibility-IDF: Exploiting open data to assess accessibility of transportation in Paris region
Exploiting open data to assess accessibility of transportation in Paris region - GitHub - SofianeKal/Accessibility-IDF: Exploiting open data to assess accessibility of transportation in Paris region
GitHub监控消息提醒!!!
更新了:红队
描述:快速的跨平台红队(red team)打点扫描器,功能 端口扫描(port scan) 指纹识别(fingerprint) nday检测(nday check) 智能爆破 (admin brute) 敏感文件扫描(file fuzz)
URL:https://github.com/veo/vscan
更新了:红队
描述:快速的跨平台红队(red team)打点扫描器,功能 端口扫描(port scan) 指纹识别(fingerprint) nday检测(nday check) 智能爆破 (admin brute) 敏感文件扫描(file fuzz)
URL:https://github.com/veo/vscan
GitHub
GitHub - veo/vscan: 开源、轻量、快速、跨平台 的网站漏洞扫描工具,帮助您快速检测网站安全隐患。功能 端口扫描(port scan) 指纹识别(fingerprint) 漏洞检测(nday check) 智能爆破 (admin brute)…
开源、轻量、快速、跨平台 的网站漏洞扫描工具,帮助您快速检测网站安全隐患。功能 端口扫描(port scan) 指纹识别(fingerprint) 漏洞检测(nday check) 智能爆破 (admin brute) 敏感文件扫描(file fuzz) - veo/vscan
GitHub监控消息提醒!!!
更新了:shellcode
描述:Linux shellcode code memory injection library .so .dll injection without ptrace example PoC
URL:https://github.com/v-a-c-u-u-m/mem_inject
更新了:shellcode
描述:Linux shellcode code memory injection library .so .dll injection without ptrace example PoC
URL:https://github.com/v-a-c-u-u-m/mem_inject
GitHub
GitHub - v-a-c-u-u-m/mem_inject: Linux shellcode code memory injection library .so .dll injection without ptrace example PoC
Linux shellcode code memory injection library .so .dll injection without ptrace example PoC - v-a-c-u-u-m/mem_inject
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploit for CVE-2018-3810
URL:https://github.com/nth347/CVE-2018-3810_exploit
更新了:Exploit
描述:Exploit for CVE-2018-3810
URL:https://github.com/nth347/CVE-2018-3810_exploit
GitHub
GitHub - nth347/CVE-2018-3810_exploit: Exploit for CVE-2018-3810
Exploit for CVE-2018-3810. Contribute to nth347/CVE-2018-3810_exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:shellcode
描述:HatSploit native powerful payload generation and shellcode injection tool that provides support for common platforms and architectures.
URL:https://github.com/EntySec/HatVenom
更新了:shellcode
描述:HatSploit native powerful payload generation and shellcode injection tool that provides support for common platforms and architectures.
URL:https://github.com/EntySec/HatVenom
GitHub监控消息提醒!!!
更新了:Exploit
描述:WordPress Backup Guard Authenticated Remote Code Execution Exploit
URL:https://github.com/0Day-dev/WordPress-Backup-RCE
更新了:Exploit
描述:WordPress Backup Guard Authenticated Remote Code Execution Exploit
URL:https://github.com/0Day-dev/WordPress-Backup-RCE
GitHub
GitHub - 0dayNinja/CVE-2021-24155.rb: WordPress Backup Guard Authenticated Remote Code Execution Exploit
WordPress Backup Guard Authenticated Remote Code Execution Exploit - GitHub - 0dayNinja/CVE-2021-24155.rb: WordPress Backup Guard Authenticated Remote Code Execution Exploit
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:WordPress Backup Guard Authenticated Remote Code Execution Exploit
URL:https://github.com/0Day-dev/CVE-2021-24155.rb
更新了:CVE-2021
描述:WordPress Backup Guard Authenticated Remote Code Execution Exploit
URL:https://github.com/0Day-dev/CVE-2021-24155.rb
GitHub
GitHub - 0dayNinja/CVE-2021-24155.rb: WordPress Backup Guard Authenticated Remote Code Execution Exploit
WordPress Backup Guard Authenticated Remote Code Execution Exploit - GitHub - 0dayNinja/CVE-2021-24155.rb: WordPress Backup Guard Authenticated Remote Code Execution Exploit