GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3
URL:https://github.com/Sp00p64/PyNightmare
更新了:CVE-2021
描述:PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3
URL:https://github.com/Sp00p64/PyNightmare
GitHub
GitHub - Sp00p64/PyNightmare: PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3
PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3 - GitHub - Sp00p64/PyNightmare: PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploit for nostromo <= 1.9.6. This exploit has the functionality of being able to have an interactive shell
URL:https://github.com/c0rnf13ld/nostromo-exploit-integrated-shell
更新了:Exploit
描述:Exploit for nostromo <= 1.9.6. This exploit has the functionality of being able to have an interactive shell
URL:https://github.com/c0rnf13ld/nostromo-exploit-integrated-shell
GitHub
GitHub - c0rnf13ld/nostromo-exploit-integrated-shell: Exploit for nostromo <= 1.9.6. This exploit has the functionality of being…
Exploit for nostromo <= 1.9.6. This exploit has the functionality of being able to have an interactive shell - GitHub - c0rnf13ld/nostromo-exploit-integrated-shell: Exploit for nostromo &...
GitHub监控消息提醒!!!
更新了:Exploit
描述:PDF Exploit Builder, bin EXE to PDF
URL:https://github.com/anonymonline2020/PDF-EXPLOIT-BUILDER
更新了:Exploit
描述:PDF Exploit Builder, bin EXE to PDF
URL:https://github.com/anonymonline2020/PDF-EXPLOIT-BUILDER
GitHub
GitHub - anonymonline2020/PDF-EXPLOIT-BUILDER: PDF Exploit Builder, bin EXE to PDF
PDF Exploit Builder, bin EXE to PDF. Contribute to anonymonline2020/PDF-EXPLOIT-BUILDER development by creating an account on GitHub.
实用软件分享: @syrjfx_sl
你就是馋她的身子: @meinvfan
Github红队资源监控:@GithubRedTeam
部分需要解压密码,进群咨询管理
https://t.me/joinchat/Sey6XNFWuGT7pxbD
你就是馋她的身子: @meinvfan
Github红队资源监控:@GithubRedTeam
部分需要解压密码,进群咨询管理
https://t.me/joinchat/Sey6XNFWuGT7pxbD
Telegram
🌈盘丝洞✨ 备用群
You’ve been invited to join this group on Telegram.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Tactics and Techniques
URL:https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
更新了:Red Team
描述:Red Teaming Tactics and Techniques
URL:https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
GitHub
GitHub - mantvydasb/RedTeaming-Tactics-and-Techniques: Red Teaming Tactics and Techniques
Red Teaming Tactics and Techniques. Contribute to mantvydasb/RedTeaming-Tactics-and-Techniques development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Exploit
描述:CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin.
URL:https://github.com/wolf0x/HiveNightmare
更新了:Exploit
描述:CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin.
URL:https://github.com/wolf0x/HiveNightmare
GitHub
GitHub - wolf0x/HiveNightmare: CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin.
CVE-2021–36934, Exploit allowing you to read any registry hives as non-admin. - wolf0x/HiveNightmare
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploits that I modified according to my need/usecase .
URL:https://github.com/A3h1nt/Exploits
更新了:Exploit
描述:Exploits that I modified according to my need/usecase .
URL:https://github.com/A3h1nt/Exploits
GitHub
GitHub - A3h1nt/Exploits: Exploits that I modified according to my need/usecase .
Exploits that I modified according to my need/usecase . - GitHub - A3h1nt/Exploits: Exploits that I modified according to my need/usecase .
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:C# PoC for CVE-2021-36934/HiveNightmare/SeriousSAM
URL:https://github.com/cube0x0/CVE-2021-36934
更新了:CVE-2021
描述:C# PoC for CVE-2021-36934/HiveNightmare/SeriousSAM
URL:https://github.com/cube0x0/CVE-2021-36934
GitHub监控消息提醒!!!
更新了:Exploit
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/HuskyHacks/ShadowSteal
更新了:Exploit
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/HuskyHacks/ShadowSteal
GitHub
GitHub - HuskyHacks/ShadowSteal: Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation - HuskyHacks/ShadowSteal
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploits project Hacking Command Center
URL:https://github.com/chacka0101/exploits
更新了:Exploit
描述:Exploits project Hacking Command Center
URL:https://github.com/chacka0101/exploits
GitHub
GitHub - chacka0101/exploits: Exploits project Hacking Command Center
Exploits project Hacking Command Center. Contribute to chacka0101/exploits development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/jmaddington/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM
更新了:CVE-2021
描述:Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
URL:https://github.com/jmaddington/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM
GitHub
GitHub - jmaddington/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM: This PowerShell script will take the mitigation measures…
This PowerShell script will take the mitigation measures for CVE-2021-36934 described by Microsoft and the US CERT team. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36934 https:...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Penetration Testing, Red Teaming, Bug Bounty, CTF Write-ups
URL:https://github.com/4t0ys3d/4t0ys3d.github.io
更新了:Red Team
描述:Penetration Testing, Red Teaming, Bug Bounty, CTF Write-ups
URL:https://github.com/4t0ys3d/4t0ys3d.github.io
GitHub
GitHub - 4t0ys3d/4t0ys3d.github.io: Penetration Testing, Red Teaming, Bug Bounty, CTF Write-ups
Penetration Testing, Red Teaming, Bug Bounty, CTF Write-ups - 4t0ys3d/4t0ys3d.github.io
GitHub监控消息提醒!!!
更新了:Exploit
描述:Exploit development and reversing of Hichip's P2P camera firmware
URL:https://github.com/0xedh/hichip-p2p-firmware-rce
更新了:Exploit
描述:Exploit development and reversing of Hichip's P2P camera firmware
URL:https://github.com/0xedh/hichip-p2p-firmware-rce
GitHub
GitHub - 0xedh/hichip-p2p-firmware-rce: Exploit development and reversing of Hichip's P2P camera firmware
Exploit development and reversing of Hichip's P2P camera firmware - 0xedh/hichip-p2p-firmware-rce
GitHub监控消息提醒!!!
更新了:Exploit
描述:Bcrypt Cracker & Exploitation Toolkit.
URL:https://github.com/duckstroms/poll-bcrypt
更新了:Exploit
描述:Bcrypt Cracker & Exploitation Toolkit.
URL:https://github.com/duckstroms/poll-bcrypt
GitHub
GitHub - duckstroms/poll-bcrypt: Bcrypt Cracker & Exploitation Toolkit.
Bcrypt Cracker & Exploitation Toolkit. Contribute to duckstroms/poll-bcrypt development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Exploit
描述:eLearnSecurity Certified Exploit Development
URL:https://github.com/CyberSecurityUP/eCXD-Preparation
更新了:Exploit
描述:eLearnSecurity Certified Exploit Development
URL:https://github.com/CyberSecurityUP/eCXD-Preparation
GitHub
GitHub - JoasASantos/eCXD-Preparation: eLearnSecurity Certified Exploit Development
eLearnSecurity Certified Exploit Development. Contribute to JoasASantos/eCXD-Preparation development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing vulnerable functions during runtime
URL:https://github.com/baerwolf/cve-2021-33909
更新了:CVE-2021
描述:This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing vulnerable functions during runtime
URL:https://github.com/baerwolf/cve-2021-33909
GitHub
GitHub - baerwolf/cve-2021-33909: This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing…
This module fixes an issue in the kernels filesystem layer (CVE-2021-33909) by kprobe-replacing vulnerable functions during runtime - GitHub - baerwolf/cve-2021-33909: This module fixes an issue in...
GitHub监控消息提醒!!!
更新了:Exploit
描述:Repository for _Exploiting BERT For Multimodal Target Sentiment Classification Through Input Space Translation_
URL:https://github.com/codezakh/exploiting-BERT-thru-translation
更新了:Exploit
描述:Repository for _Exploiting BERT For Multimodal Target Sentiment Classification Through Input Space Translation_
URL:https://github.com/codezakh/exploiting-BERT-thru-translation
GitHub
GitHub - codezakh/exploiting-BERT-thru-translation: Repository for "Exploiting BERT For Multimodal Target Sentiment Classification…
Repository for "Exploiting BERT For Multimodal Target Sentiment Classification Through Input Space Translation" [ACM MM '21] - GitHub - codezakh/exploiting-BERT-thru-trans...
GitHub监控消息提醒!!!
更新了:Exploit
描述:PS4 7.5X Host Exploit (Reduce sleeps in jb.c to speed up)
URL:https://github.com/Night-King-Host/75XV3b2
更新了:Exploit
描述:PS4 7.5X Host Exploit (Reduce sleeps in jb.c to speed up)
URL:https://github.com/Night-King-Host/75XV3b2
GitHub
GitHub - Night-King-Host/75XV3b2: PS4 7.5X Host Exploit (Reduce sleeps in jb.c to speed up)
PS4 7.5X Host Exploit (Reduce sleeps in jb.c to speed up) - GitHub - Night-King-Host/75XV3b2: PS4 7.5X Host Exploit (Reduce sleeps in jb.c to speed up)