GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Web UI for creating C2 profiles for Cobalt Strike
URL:https://github.com/Cobalt-Strike/sleep_python_bridge
更新了:Cobalt Strike
描述:Web UI for creating C2 profiles for Cobalt Strike
URL:https://github.com/Cobalt-Strike/sleep_python_bridge
GitHub
GitHub - Cobalt-Strike/sleep_python_bridge: This project is 'bridge' between the sleep and python language. It allows the control…
This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client. ...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
URL:https://github.com/ZeusBox/CVE-2021-37980
更新了:CVE-2021
描述:PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
URL:https://github.com/ZeusBox/CVE-2021-37980
GitHub
GitHub - ZeusBox/CVE-2021-37980: PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only) - ZeusBox/CVE-2021-37980
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Testing CVE-2021-30858 Rev3
URL:https://github.com/KameleonReloaded/CVEREV3
更新了:CVE-2021
描述:Testing CVE-2021-30858 Rev3
URL:https://github.com/KameleonReloaded/CVEREV3
GitHub
GitHub - KameleonReloaded/CVEREV3: Testing CVE-2021-30858 Rev3
Testing CVE-2021-30858 Rev3. Contribute to KameleonReloaded/CVEREV3 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files.
URL:https://github.com/xenoscr/atomiccaldera
更新了:Red Team
描述:A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files.
URL:https://github.com/xenoscr/atomiccaldera
GitHub
GitHub - xenoscr/atomiccaldera: A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to…
A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files. - GitHub - xenoscr/atomiccaldera: A MITRE Caldera plugin w...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:My take on CVE-2021-30858 for ps4 8.xx
URL:https://github.com/PeterMxx/ps4_8.00_vuln_poc
更新了:CVE-2021
描述:My take on CVE-2021-30858 for ps4 8.xx
URL:https://github.com/PeterMxx/ps4_8.00_vuln_poc
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
URL:https://github.com/bhdresh/CVE-2021-33766
更新了:CVE-2021
描述:ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
URL:https://github.com/bhdresh/CVE-2021-33766
GitHub
GitHub - bhdresh/CVE-2021-33766: ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit - bhdresh/CVE-2021-33766
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type
URL:https://github.com/outflanknl/HelpColor
更新了:Cobalt Strike
描述:Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type
URL:https://github.com/outflanknl/HelpColor
GitHub
GitHub - outflanknl/HelpColor: Agressor script that lists available Cobalt Strike beacon commands and colors them based on their…
Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type - outflanknl/HelpColor
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team programming projects.
URL:https://github.com/ncerne00/Red-Team-Projects
更新了:Red Team
描述:Red Team programming projects.
URL:https://github.com/ncerne00/Red-Team-Projects
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:A simple Python proof of concept for CVE-2021-38295.
URL:https://github.com/ProfessionallyEvil/CVE-2021-38295-PoC
更新了:CVE-2021
描述:A simple Python proof of concept for CVE-2021-38295.
URL:https://github.com/ProfessionallyEvil/CVE-2021-38295-PoC
GitHub
GitHub - ProfessionallyEvil/CVE-2021-38295-PoC: A simple Python proof of concept for CVE-2021-38295.
A simple Python proof of concept for CVE-2021-38295. - ProfessionallyEvil/CVE-2021-38295-PoC
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Docker container lab to play/learn with CVE-2021-42013
URL:https://github.com/twseptian/CVE-2021-42013-Lab
更新了:CVE-2021
描述:Docker container lab to play/learn with CVE-2021-42013
URL:https://github.com/twseptian/CVE-2021-42013-Lab
GitHub
GitHub - twseptian/cve-2021-42013-docker-lab: Docker container lab to play/learn with CVE-2021-42013
Docker container lab to play/learn with CVE-2021-42013 - GitHub - twseptian/cve-2021-42013-docker-lab: Docker container lab to play/learn with CVE-2021-42013
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/B-garces/Red-Team-VS-Blue-Team-Project
更新了:Red Team
描述:Red Team Toolkit for CTF's and Learning for Windows Offense
URL:https://github.com/B-garces/Red-Team-VS-Blue-Team-Project
GitHub
GitHub - B-garces/Red-Team-VS-Blue-Team-Project: Acted as a red team to attack a vulnerable VM within my environment, ultimately…
Acted as a red team to attack a vulnerable VM within my environment, ultimately gaining root access to the machine. Acted as Blue Team to use Kibana to review logs taken during the attack implement...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519
URL:https://github.com/MrCl0wnLab/SimplesApachePathTraversal
更新了:CVE-2021
描述:Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519
URL:https://github.com/MrCl0wnLab/SimplesApachePathTraversal
GitHub
GitHub - MrCl0wnLab/SimplesApachePathTraversal: Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519
Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519 - MrCl0wnLab/SimplesApachePathTraversal
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)
URL:https://github.com/theLSA/apache-httpd-path-traversal-checker
更新了:CVE-2021
描述:apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)
URL:https://github.com/theLSA/apache-httpd-path-traversal-checker
GitHub
GitHub - theLSA/apache-httpd-path-traversal-checker: apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)
apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013) - theLSA/apache-httpd-path-traversal-checker
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.
URL:https://github.com/LudovicPatho/CVE-2021-41773
更新了:CVE-2021
描述:The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.
URL:https://github.com/LudovicPatho/CVE-2021-41773
GitHub
GitHub - LudovicPatho/CVE-2021-41773: The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that…
The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49. - LudovicPatho/CVE-2021-41773
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-41773-PoC
URL:https://github.com/anonsecteaminc/CVE-2021-41773-PoC
更新了:CVE-2021
描述:CVE-2021-41773-PoC
URL:https://github.com/anonsecteaminc/CVE-2021-41773-PoC
GitHub监控消息提醒!!!
更新了:Red Team
描述:Material do Bootcamp de Red Team - by Victor de Queiroz
URL:https://github.com/CATx003/RedTeamOPS-bootcamp101
更新了:Red Team
描述:Material do Bootcamp de Red Team - by Victor de Queiroz
URL:https://github.com/CATx003/RedTeamOPS-bootcamp101
GitHub
GitHub - CATx003/RedTeamOPS-bootcamp101: Material do Bootcamp de Red Team - by Victor de Queiroz
Material do Bootcamp de Red Team - by Victor de Queiroz - GitHub - CATx003/RedTeamOPS-bootcamp101: Material do Bootcamp de Red Team - by Victor de Queiroz
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:TIC4301 Project - CVE-2021-40444
URL:https://github.com/factionsypho/TIC4301_Project
更新了:CVE-2021
描述:TIC4301 Project - CVE-2021-40444
URL:https://github.com/factionsypho/TIC4301_Project
GitHub
GitHub - factionsypho/TIC4301_Project: TIC4301 Project - CVE-2021-40444
TIC4301 Project - CVE-2021-40444. Contribute to factionsypho/TIC4301_Project development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Simple honeypot for CVE-2021-41773 vulnerability
URL:https://github.com/lopqto/CVE-2021-41773_Honeypot
更新了:CVE-2021
描述:Simple honeypot for CVE-2021-41773 vulnerability
URL:https://github.com/lopqto/CVE-2021-41773_Honeypot
GitHub
GitHub - lopqto/CVE-2021-41773_Honeypot: Simple honeypot for CVE-2021-41773 vulnerability
Simple honeypot for CVE-2021-41773 vulnerability. Contribute to lopqto/CVE-2021-41773_Honeypot development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Strategies for HackTheBox / Red Teaming
URL:https://github.com/edrapac/hack-the-box-strategies
更新了:Red Team
描述:Strategies for HackTheBox / Red Teaming
URL:https://github.com/edrapac/hack-the-box-strategies
GitHub
GitHub - edrapac/hack-the-box-strategies: Strategies for HackTheBox / Red Teaming
Strategies for HackTheBox / Red Teaming. Contribute to edrapac/hack-the-box-strategies development by creating an account on GitHub.