GitHub监控消息提醒!!!
更新了:CVE-2023
描述:jeecg-boot unauthorized SQL Injection Vulnerability (CVE-2023-1454)
URL:https://github.com/gobysec/CVE-2023-1454
标签:#CVE-2023
更新了:CVE-2023
描述:jeecg-boot unauthorized SQL Injection Vulnerability (CVE-2023-1454)
URL:https://github.com/gobysec/CVE-2023-1454
标签:#CVE-2023
GitHub
GitHub - gobysec/CVE-2023-1454: jeecg-boot unauthorized SQL Injection Vulnerability (CVE-2023-1454)
jeecg-boot unauthorized SQL Injection Vulnerability (CVE-2023-1454) - gobysec/CVE-2023-1454
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-28432,minio未授权访问检测工具
URL:https://github.com/Okaytc/minio_unauth_check
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-28432,minio未授权访问检测工具
URL:https://github.com/Okaytc/minio_unauth_check
标签:#CVE-2023
GitHub
GitHub - Okaytc/minio_unauth_check: CVE-2023-28432,minio未授权访问检测工具
CVE-2023-28432,minio未授权访问检测工具. Contribute to Okaytc/minio_unauth_check development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:discord bot to find and delete images affected by CVE-2023-21036
URL:https://github.com/maddiethecafebabe/discord-acropolypse-bot
标签:#CVE-2023
更新了:CVE-2023
描述:discord bot to find and delete images affected by CVE-2023-21036
URL:https://github.com/maddiethecafebabe/discord-acropolypse-bot
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-28432 POC
URL:https://github.com/acheiii/CVE-2023-28432
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-28432 POC
URL:https://github.com/acheiii/CVE-2023-28432
标签:#CVE-2023
GitHub
GitHub - acheiii/CVE-2023-28432: CVE-2023-28432 POC
CVE-2023-28432 POC. Contribute to acheiii/CVE-2023-28432 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞POC
描述:自动整合全网Nuclei的漏洞POC,实时同步更新最新POC!
URL:https://github.com/zangcc/Aazhen-RexHa
标签:#漏洞POC
更新了:漏洞POC
描述:自动整合全网Nuclei的漏洞POC,实时同步更新最新POC!
URL:https://github.com/zangcc/Aazhen-RexHa
标签:#漏洞POC
GitHub
GitHub - zangcc/Aazhen-RexHa: 自研JavaFX图形化漏洞扫描工具,支持扫描的漏洞分别是: ThinkPHP-2.x-RCE, ThinkPHP-5.0.23-RCE, ThinkPHP5.0.x-5.0.23通杀RCE, ThinkPHP5…
自研JavaFX图形化漏洞扫描工具,支持扫描的漏洞分别是: ThinkPHP-2.x-RCE, ThinkPHP-5.0.23-RCE, ThinkPHP5.0.x-5.0.23通杀RCE, ThinkPHP5-SQL注入&敏感信息泄露, ThinkPHP 3.x 日志泄露NO.1, ThinkPHP 3.x 日志泄露NO.2, ThinkPHP 5.x 数据库信息泄露的漏洞...
GitHub监控消息提醒!!!
更新了:应急响应
描述:whohk,linux下一款强大的应急响应工具 在linux下的应急响应往往需要通过繁琐的命令行来查看各个点的情况,有的时候还需要做一些格式处理,这对于linux下命令不是很熟悉的人比较不友好。本工具将linux下应急响应中常用的一些操作给集合了起来,并处理成了较为友好的格式,只需要通过一个参数就能代替繁琐复杂的命令来实现对各个点的检查。
URL:https://github.com/wgpsec/whohk
标签:#应急响应
更新了:应急响应
描述:whohk,linux下一款强大的应急响应工具 在linux下的应急响应往往需要通过繁琐的命令行来查看各个点的情况,有的时候还需要做一些格式处理,这对于linux下命令不是很熟悉的人比较不友好。本工具将linux下应急响应中常用的一些操作给集合了起来,并处理成了较为友好的格式,只需要通过一个参数就能代替繁琐复杂的命令来实现对各个点的检查。
URL:https://github.com/wgpsec/whohk
标签:#应急响应
GitHub
GitHub - wgpsec/whohk: whohk,linux下一款强大的应急响应工具 在linux下的应急响应往往需要通过繁琐的命令行来查看各个点的情况,有的时候还需要做一些格式处理,这对于linux下命令不是很熟悉的人比较不友好。本工具将l…
whohk,linux下一款强大的应急响应工具 在linux下的应急响应往往需要通过繁琐的命令行来查看各个点的情况,有的时候还需要做一些格式处理,这对于linux下命令不是很熟悉的人比较不友好。本工具将linux下应急响应中常用的一些操作给集合了起来,并处理成了较为友好的格式,只需要通过一个参数就能代替繁琐复杂的命令来实现对各个点的检查。 - wgpsec/whohk
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:test of exploit for CVE-2023-21716
URL:https://github.com/hv0l/CVE-2023-21716_exploit
标签:#CVE-2023
更新了:CVE-2023
描述:test of exploit for CVE-2023-21716
URL:https://github.com/hv0l/CVE-2023-21716_exploit
标签:#CVE-2023
GitHub
GitHub - hv0l/CVE-2023-21716_exploit: test of exploit for CVE-2023-21716
test of exploit for CVE-2023-21716. Contribute to hv0l/CVE-2023-21716_exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Files from a Red Team v. Blue Team competition hosted by myself
URL:https://github.com/Akshay-Rohatgi/operation-TITAN-SHIELD
标签:#Red Team
更新了:Red Team
描述:Files from a Red Team v. Blue Team competition hosted by myself
URL:https://github.com/Akshay-Rohatgi/operation-TITAN-SHIELD
标签:#Red Team
GitHub
GitHub - Akshay-Rohatgi/operation-TITAN-SHIELD: Files from a Red Team v. Blue Team competition I hosted
Files from a Red Team v. Blue Team competition I hosted - GitHub - Akshay-Rohatgi/operation-TITAN-SHIELD: Files from a Red Team v. Blue Team competition I hosted
👍1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-23397 powershell patch script for Windows 10 and 11
URL:https://github.com/Zeppperoni/CVE-2023-23397-Patch
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-23397 powershell patch script for Windows 10 and 11
URL:https://github.com/Zeppperoni/CVE-2023-23397-Patch
标签:#CVE-2023
GitHub
GitHub - Zeppperoni/CVE-2023-23397-Patch: CVE-2023-23397 powershell patch script for Windows 10 and 11
CVE-2023-23397 powershell patch script for Windows 10 and 11 - GitHub - Zeppperoni/CVE-2023-23397-Patch: CVE-2023-23397 powershell patch script for Windows 10 and 11
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-23397 powershell patch script for Windows 10 and 11
URL:https://github.com/PSIRT-REPO/CVE-2023-25610
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-23397 powershell patch script for Windows 10 and 11
URL:https://github.com/PSIRT-REPO/CVE-2023-25610
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:Red Team
描述:These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
URL:https://github.com/sho-luv/gpt_tools
标签:#Red Team
更新了:Red Team
描述:These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
URL:https://github.com/sho-luv/gpt_tools
标签:#Red Team
GitHub
GitHub - sho-luv/gpt_tools: These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming
These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming - sho-luv/gpt_tools
GitHub监控消息提醒!!!
更新了:Red Team
描述:HTU Cyber Security Club, Offensive Operations Section ( Red Team ) learning pathway
URL:https://github.com/kawaiipantsu/exfiltration-thugsred-service
标签:#Red Team
更新了:Red Team
描述:HTU Cyber Security Club, Offensive Operations Section ( Red Team ) learning pathway
URL:https://github.com/kawaiipantsu/exfiltration-thugsred-service
标签:#Red Team
GitHub
GitHub - kawaiipantsu/exfiltration-thugsred-service: An red-team exfiltration service for showcasing or in field usage, this is…
An red-team exfiltration service for showcasing or in field usage, this is also what thugs.red is running online for public usage for quick showcase implementation etc. The content provided is for ...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized
URL:https://github.com/karthikuj/CVE-2023-23752-Docker
标签:#CVE-2023
更新了:CVE-2023
描述:Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized
URL:https://github.com/karthikuj/CVE-2023-23752-Docker
标签:#CVE-2023
GitHub
GitHub - karthikuj/CVE-2023-23752-Docker: Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized
Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized - karthikuj/CVE-2023-23752-Docker
GitHub监控消息提醒!!!
更新了:getshell
描述:本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更新例如:log4jRCE,向日葵 禅道RCE 等等.
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
标签:#getshell
更新了:getshell
描述:本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更新例如:log4jRCE,向日葵 禅道RCE 等等.
URL:https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
标签:#getshell
GitHub
GitHub - peiqiF4ck/WebFrameworkTools-5.5-enhance: 本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getsh…
本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更新例如:log4jRCE,向日葵 禅道RCE 瑞友天翼应用虚拟化系统sql注入导致RCE大华智慧园区上传,金蝶云星空漏洞等等. ...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:用于渗透测试中对40x页面进行bypass并发扫描,采用go编写
URL:https://github.com/carl1l/f403
标签:#渗透测试
更新了:渗透测试
描述:用于渗透测试中对40x页面进行bypass并发扫描,采用go编写
URL:https://github.com/carl1l/f403
标签:#渗透测试
GitHub
GitHub - carl1l/f403: 用于渗透测试中对40x页面进行bypass并发扫描,采用go编写
用于渗透测试中对40x页面进行bypass并发扫描,采用go编写. Contribute to carl1l/f403 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Discord bot for mitigating the aCropalypse vulnerability (CVE-2023-21036) by retroactively deleting vulnerable images
URL:https://github.com/qixils/AntiCropalypse
标签:#CVE-2023
更新了:CVE-2023
描述:Discord bot for mitigating the aCropalypse vulnerability (CVE-2023-21036) by retroactively deleting vulnerable images
URL:https://github.com/qixils/AntiCropalypse
标签:#CVE-2023
GitHub
GitHub - qixils/AntiCropalypse: Discord bot for mitigating the aCropalypse vulnerability (CVE-2023-21036, CVE-2023-28303) by retroactively…
Discord bot for mitigating the aCropalypse vulnerability (CVE-2023-21036, CVE-2023-28303) by retroactively deleting vulnerable images - GitHub - qixils/AntiCropalypse: Discord bot for mitigating th...