GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection
URL:https://github.com/AlAIAL90/CVE-2021-28695
更新了:CVE-2021
描述:CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection
URL:https://github.com/AlAIAL90/CVE-2021-28695
GitHub
GitHub - AlAIAL90/CVE-2021-28695: PoC for exploiting CVE-2021-28695 : IOMMU page mapping issues on x86 T[his CNA information record…
PoC for exploiting CVE-2021-28695 : IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.]...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC for exploiting CVE-2021-36934 : Windows Elevation of Privilege Vulnerability
URL:https://github.com/AlAIAL90/CVE-2021-36934
更新了:CVE-2021
描述:PoC for exploiting CVE-2021-36934 : Windows Elevation of Privilege Vulnerability
URL:https://github.com/AlAIAL90/CVE-2021-36934
GitHub监控消息提醒!!!
更新了:Red Team
描述:A Red Team tool for exfiltrating sensitive data from Confluence pages.
URL:https://github.com/antman1p/Conf-Thief
更新了:Red Team
描述:A Red Team tool for exfiltrating sensitive data from Confluence pages.
URL:https://github.com/antman1p/Conf-Thief
GitHub
GitHub - antman1p/Conf-Thief: A Red Team tool for exfiltrating sensitive data from Confluence pages.
A Red Team tool for exfiltrating sensitive data from Confluence pages. - antman1p/Conf-Thief
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
URL:https://github.com/lntrx/CVE-2021-28663
更新了:CVE-2021
描述:A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
URL:https://github.com/lntrx/CVE-2021-28663
GitHub
GitHub - lntrx/CVE-2021-28663: A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability) - lntrx/CVE-2021-28663
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
URL:https://github.com/AlAIAL90/CVE-2021-28164
更新了:CVE-2021
描述:A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
URL:https://github.com/AlAIAL90/CVE-2021-28164
GitHub
GitHub - AlAIAL90/CVE-2021-28164: PoC for exploiting CVE-2021-28164 : In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the…
PoC for exploiting CVE-2021-28164 : In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protec...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-26084 to verify the vulnerability without executing any commands on the machine
URL:https://github.com/BeRserKerSec/CVE-2021-26084-Nuclei-template
更新了:CVE-2021
描述:CVE-2021-26084 to verify the vulnerability without executing any commands on the machine
URL:https://github.com/BeRserKerSec/CVE-2021-26084-Nuclei-template
GitHub
GitHub - BeRserKerSec/CVE-2021-26084-Nuclei-template: This nuclei template is to verify the vulnerability without executing any…
This nuclei template is to verify the vulnerability without executing any commands to the target machine - GitHub - BeRserKerSec/CVE-2021-26084-Nuclei-template: This nuclei template is to verify t...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Página web con mis apuntes de Red Team
URL:https://github.com/nodeshift/nodejs-reference-architecture
更新了:Red Team
描述:Página web con mis apuntes de Red Team
URL:https://github.com/nodeshift/nodejs-reference-architecture
GitHub
GitHub - nodeshift/nodejs-reference-architecture: The Red Hat and IBM Node.js Reference architecture. The teams 'opinion' on what…
The Red Hat and IBM Node.js Reference architecture. The teams 'opinion' on what components our customers and internal teams should use when building Node.js applications and guidan...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Home Lab for breaching-defenses.com with an ELK stack
URL:https://github.com/RobinFassina-Moschini/Breaching-Defenses.com
更新了:Red Team
描述:Red Team Home Lab for breaching-defenses.com with an ELK stack
URL:https://github.com/RobinFassina-Moschini/Breaching-Defenses.com
GitHub
GitHub - RobinFassina-Moschini/Breaching-Defenses.com: Red Team Home Lab for breaching-defenses.com with an ELK stack
Red Team Home Lab for breaching-defenses.com with an ELK stack - GitHub - RobinFassina-Moschini/Breaching-Defenses.com: Red Team Home Lab for breaching-defenses.com with an ELK stack
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Dell Driver EoP (CVE-2021-21551)
URL:https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551
更新了:CVE-2021
描述:Dell Driver EoP (CVE-2021-21551)
URL:https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551
GitHub
GitHub - ihack4falafel/Dell-Driver-EoP-CVE-2021-21551: Dell Driver EoP (CVE-2021-21551)
Dell Driver EoP (CVE-2021-21551). Contribute to ihack4falafel/Dell-Driver-EoP-CVE-2021-21551 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:含免杀一句话、大马等过狗waf - 来源于网络收集的webshell,实时更新。
URL:https://github.com/H4K6/webshell
更新了:免杀
描述:含免杀一句话、大马等过狗waf - 来源于网络收集的webshell,实时更新。
URL:https://github.com/H4K6/webshell
GitHub
GitHub - H4K6/webshell: 含免杀一句话、大马等过狗waf - 来源于网络收集的webshell,实时更新。
含免杀一句话、大马等过狗waf - 来源于网络收集的webshell,实时更新。. Contribute to H4K6/webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-26084 Confluence OGNL injection
URL:https://github.com/Loneyers/CVE-2021-26084
更新了:CVE-2021
描述:CVE-2021-26084 Confluence OGNL injection
URL:https://github.com/Loneyers/CVE-2021-26084
GitHub
GitHub - Loneyers/CVE-2021-26084: CVE-2021-26084 Confluence OGNL injection
CVE-2021-26084 Confluence OGNL injection. Contribute to Loneyers/CVE-2021-26084 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike Leaked Conti Manual v2 Active Directory
URL:https://github.com/centralinfosec/Cobalt-Strike-Leaked-Conti-Manual-v2-Active-Directory
更新了:Cobalt Strike
描述:Cobalt Strike Leaked Conti Manual v2 Active Directory
URL:https://github.com/centralinfosec/Cobalt-Strike-Leaked-Conti-Manual-v2-Active-Directory
GitHub
GitHub - centralinfosec/Cobalt-Strike-Leaked-Conti-Manual-v2-Active-Directory: Cobalt Strike Leaked Conti Manual v2 Active Directory
Cobalt Strike Leaked Conti Manual v2 Active Directory - GitHub - centralinfosec/Cobalt-Strike-Leaked-Conti-Manual-v2-Active-Directory: Cobalt Strike Leaked Conti Manual v2 Active Directory
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike script for ScareCrow payloads (EDR/AV evasion)
URL:https://github.com/GeorgePatsias/ScareCrow-CobaltStrike
更新了:Cobalt Strike
描述:Cobalt Strike script for ScareCrow payloads (EDR/AV evasion)
URL:https://github.com/GeorgePatsias/ScareCrow-CobaltStrike
GitHub
GitHub - GeorgePatsias/ScareCrow-CobaltStrike: Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)
Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion) - GeorgePatsias/ScareCrow-CobaltStrike