GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
URL:https://github.com/AlAIAL90/CVE-2021-28164
更新了:CVE-2021
描述:A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)
URL:https://github.com/AlAIAL90/CVE-2021-28164
GitHub
GitHub - AlAIAL90/CVE-2021-28164: PoC for exploiting CVE-2021-28164 : In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the…
PoC for exploiting CVE-2021-28164 : In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protec...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-26084 to verify the vulnerability without executing any commands on the machine
URL:https://github.com/BeRserKerSec/CVE-2021-26084-Nuclei-template
更新了:CVE-2021
描述:CVE-2021-26084 to verify the vulnerability without executing any commands on the machine
URL:https://github.com/BeRserKerSec/CVE-2021-26084-Nuclei-template
GitHub
GitHub - BeRserKerSec/CVE-2021-26084-Nuclei-template: This nuclei template is to verify the vulnerability without executing any…
This nuclei template is to verify the vulnerability without executing any commands to the target machine - GitHub - BeRserKerSec/CVE-2021-26084-Nuclei-template: This nuclei template is to verify t...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Página web con mis apuntes de Red Team
URL:https://github.com/nodeshift/nodejs-reference-architecture
更新了:Red Team
描述:Página web con mis apuntes de Red Team
URL:https://github.com/nodeshift/nodejs-reference-architecture
GitHub
GitHub - nodeshift/nodejs-reference-architecture: The Red Hat and IBM Node.js Reference architecture. The teams 'opinion' on what…
The Red Hat and IBM Node.js Reference architecture. The teams 'opinion' on what components our customers and internal teams should use when building Node.js applications and guidan...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Home Lab for breaching-defenses.com with an ELK stack
URL:https://github.com/RobinFassina-Moschini/Breaching-Defenses.com
更新了:Red Team
描述:Red Team Home Lab for breaching-defenses.com with an ELK stack
URL:https://github.com/RobinFassina-Moschini/Breaching-Defenses.com
GitHub
GitHub - RobinFassina-Moschini/Breaching-Defenses.com: Red Team Home Lab for breaching-defenses.com with an ELK stack
Red Team Home Lab for breaching-defenses.com with an ELK stack - GitHub - RobinFassina-Moschini/Breaching-Defenses.com: Red Team Home Lab for breaching-defenses.com with an ELK stack
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Dell Driver EoP (CVE-2021-21551)
URL:https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551
更新了:CVE-2021
描述:Dell Driver EoP (CVE-2021-21551)
URL:https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551
GitHub
GitHub - ihack4falafel/Dell-Driver-EoP-CVE-2021-21551: Dell Driver EoP (CVE-2021-21551)
Dell Driver EoP (CVE-2021-21551). Contribute to ihack4falafel/Dell-Driver-EoP-CVE-2021-21551 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:含免杀一句话、大马等过狗waf - 来源于网络收集的webshell,实时更新。
URL:https://github.com/H4K6/webshell
更新了:免杀
描述:含免杀一句话、大马等过狗waf - 来源于网络收集的webshell,实时更新。
URL:https://github.com/H4K6/webshell
GitHub
GitHub - H4K6/webshell: 含免杀一句话、大马等过狗waf - 来源于网络收集的webshell,实时更新。
含免杀一句话、大马等过狗waf - 来源于网络收集的webshell,实时更新。. Contribute to H4K6/webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-26084 Confluence OGNL injection
URL:https://github.com/Loneyers/CVE-2021-26084
更新了:CVE-2021
描述:CVE-2021-26084 Confluence OGNL injection
URL:https://github.com/Loneyers/CVE-2021-26084
GitHub
GitHub - Loneyers/CVE-2021-26084: CVE-2021-26084 Confluence OGNL injection
CVE-2021-26084 Confluence OGNL injection. Contribute to Loneyers/CVE-2021-26084 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike Leaked Conti Manual v2 Active Directory
URL:https://github.com/centralinfosec/Cobalt-Strike-Leaked-Conti-Manual-v2-Active-Directory
更新了:Cobalt Strike
描述:Cobalt Strike Leaked Conti Manual v2 Active Directory
URL:https://github.com/centralinfosec/Cobalt-Strike-Leaked-Conti-Manual-v2-Active-Directory
GitHub
GitHub - centralinfosec/Cobalt-Strike-Leaked-Conti-Manual-v2-Active-Directory: Cobalt Strike Leaked Conti Manual v2 Active Directory
Cobalt Strike Leaked Conti Manual v2 Active Directory - GitHub - centralinfosec/Cobalt-Strike-Leaked-Conti-Manual-v2-Active-Directory: Cobalt Strike Leaked Conti Manual v2 Active Directory
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike script for ScareCrow payloads (EDR/AV evasion)
URL:https://github.com/GeorgePatsias/ScareCrow-CobaltStrike
更新了:Cobalt Strike
描述:Cobalt Strike script for ScareCrow payloads (EDR/AV evasion)
URL:https://github.com/GeorgePatsias/ScareCrow-CobaltStrike
GitHub
GitHub - GeorgePatsias/ScareCrow-CobaltStrike: Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)
Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion) - GeorgePatsias/ScareCrow-CobaltStrike
GitHub监控消息提醒!!!
更新了:Red Team
描述:Super User Sus, an evil script for Red Teams in competitions
URL:https://github.com/ChallengeVictory/SUS
更新了:Red Team
描述:Super User Sus, an evil script for Red Teams in competitions
URL:https://github.com/ChallengeVictory/SUS
GitHub
GitHub - Bardificer/SUS: Super User Sus, an evil script for Red Teams in competitions
Super User Sus, an evil script for Red Teams in competitions - GitHub - Bardificer/SUS: Super User Sus, an evil script for Red Teams in competitions
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS)
URL:https://github.com/5qu1n7/CVE-2021-40492
更新了:CVE-2021
描述:CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS)
URL:https://github.com/5qu1n7/CVE-2021-40492
GitHub
GitHub - 5qu1n7/CVE-2021-40492: CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS)
CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS) - GitHub - 5qu1n7/CVE-2021-40492: CVE-2021-40492 Gibbon version 22 Reflected Cross Site Scripting (XSS)
GitHub监控消息提醒!!!
更新了:Red Team
描述:notes for Red Team Exams
URL:https://github.com/kyleAW/Red-Team-Exam-Notes
更新了:Red Team
描述:notes for Red Team Exams
URL:https://github.com/kyleAW/Red-Team-Exam-Notes
GitHub
GitHub - kyleAW/Red-Team-Exam-Notes: notes for Red Team Exams
notes for Red Team Exams. Contribute to kyleAW/Red-Team-Exam-Notes development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Backporting CVE-2021-1748 patch for iOS <=14.3
URL:https://github.com/ChiChou/mistune-patch-backport
更新了:CVE-2021
描述:Backporting CVE-2021-1748 patch for iOS <=14.3
URL:https://github.com/ChiChou/mistune-patch-backport
GitHub
GitHub - ChiChou/mistune-patch-backport: Backporting CVE-2021-1748 patch for iOS <=14.3
Backporting CVE-2021-1748 patch for iOS <=14.3. Contribute to ChiChou/mistune-patch-backport development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Backporting CVE-2021-1748 patch for iOS <=14.3
URL:https://github.com/AlAIAL90/CVE-2021-37608
更新了:CVE-2021
描述:Backporting CVE-2021-1748 patch for iOS <=14.3
URL:https://github.com/AlAIAL90/CVE-2021-37608
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC for exploiting CVE-2021-32955 : Delta Electronics DIAEnergie Version 1.7.5 and prior allows unrestricted file uploads, which may allow an attacker to remotely execute code.
URL:https://github.com/AlAIAL90/CVE-2021-1588
更新了:CVE-2021
描述:PoC for exploiting CVE-2021-32955 : Delta Electronics DIAEnergie Version 1.7.5 and prior allows unrestricted file uploads, which may allow an attacker to remotely execute code.
URL:https://github.com/AlAIAL90/CVE-2021-1588