渗透/安全推送中心
创建者:Noxtal
项目描述:All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.
项目链接:https://github.com/Noxtal/follina
#CVE_2022
创建者:Noxtal
项目描述:All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.
项目链接:https://github.com/Noxtal/follina
#CVE_2022
GitHub
GitHub - Noxtal/follina: All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic…
All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check ...
渗透/安全推送中心
创建者:OSdetector
项目描述:基于eBPF收集操作系统信息,并使用时间序列模型进行智能化的异常情况检测
项目链接:https://github.com/OSdetector/OSdetector
#信息收集
创建者:OSdetector
项目描述:基于eBPF收集操作系统信息,并使用时间序列模型进行智能化的异常情况检测
项目链接:https://github.com/OSdetector/OSdetector
#信息收集
GitHub
GitHub - OSdetector/OSdetector: 基于eBPF收集操作系统信息,并使用时间序列模型进行智能化的异常情况检测
基于eBPF收集操作系统信息,并使用时间序列模型进行智能化的异常情况检测. Contribute to OSdetector/OSdetector development by creating an account on GitHub.
渗透/安全推送中心
创建者:luck-ying
项目描述:基于Pocsuite3、goby编写的漏洞poc&exp存档
项目链接:https://github.com/luck-ying/Library-POC
#漏洞
创建者:luck-ying
项目描述:基于Pocsuite3、goby编写的漏洞poc&exp存档
项目链接:https://github.com/luck-ying/Library-POC
#漏洞
GitHub
GitHub - luck-ying/Library-POC: 基于Pocsuite3、goby编写的漏洞poc&exp存档
基于Pocsuite3、goby编写的漏洞poc&exp存档. Contribute to luck-ying/Library-POC development by creating an account on GitHub.
渗透/安全推送中心
创建者:buffer
项目描述:Python low-interaction honeyclient
项目链接:https://github.com/buffer/thug
#shellcode #client_honeypot #honeyclient #low_interaction #python #security_tools #shellcode #virustotal
创建者:buffer
项目描述:Python low-interaction honeyclient
项目链接:https://github.com/buffer/thug
#shellcode #client_honeypot #honeyclient #low_interaction #python #security_tools #shellcode #virustotal
GitHub
GitHub - buffer/thug: Python low-interaction honeyclient
Python low-interaction honeyclient. Contribute to buffer/thug development by creating an account on GitHub.
渗透/安全推送中心
创建者:0xJs
项目描述:Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
项目链接:https://github.com/0xJs/RedTeaming_CheatSheet
#red_team
创建者:0xJs
项目描述:Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
项目链接:https://github.com/0xJs/RedTeaming_CheatSheet
#red_team
GitHub
GitHub - 0xJs/RedTeaming_CheatSheet: Pentesting cheatsheet with all the commands I learned during my learning journey. Will try…
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date. - 0xJs/RedTeaming_CheatSheet
渗透/安全推送中心
创建者:ZeroMemoryEx
项目描述: x64/x86 shellcode injector
项目链接:https://github.com/ZeroMemoryEx/Shellcode-Injector
#shellcode #process_hollowing #process_injection #red_team #shellcode_injector
创建者:ZeroMemoryEx
项目描述: x64/x86 shellcode injector
项目链接:https://github.com/ZeroMemoryEx/Shellcode-Injector
#shellcode #process_hollowing #process_injection #red_team #shellcode_injector
GitHub
GitHub - ZeroMemoryEx/Shellcode-Injector: simple shellcode injector
simple shellcode injector. Contribute to ZeroMemoryEx/Shellcode-Injector development by creating an account on GitHub.
渗透/安全推送中心
创建者:0x414141414
项目描述:暂无
项目链接:https://github.com/0x414141414/Silent-Word-Exploit-CVE-2022
#CVE_2022
创建者:0x414141414
项目描述:暂无
项目链接:https://github.com/0x414141414/Silent-Word-Exploit-CVE-2022
#CVE_2022
渗透/安全推送中心
创建者:p0dalirius
项目描述:Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
项目链接:https://github.com/p0dalirius/Awesome-RCE-techniques
#rce #awesome_list #bugbounty #cms #code #execution #exploit #framework #rce
创建者:p0dalirius
项目描述:Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
项目链接:https://github.com/p0dalirius/Awesome-RCE-techniques
#rce #awesome_list #bugbounty #cms #code #execution #exploit #framework #rce
GitHub
GitHub - p0dalirius/Awesome-RCE-techniques: Awesome list of step by step techniques to achieve Remote Code Execution on various…
Awesome list of step by step techniques to achieve Remote Code Execution on various apps! - p0dalirius/Awesome-RCE-techniques
渗透/安全推送中心
创建者:Ruia-ruia
项目描述:Exploit for CVE-2022-29582 targeting Google's Kernel CTF
项目链接:https://github.com/Ruia-ruia/CVE-2022-29582-Exploit
#CVE_2022
创建者:Ruia-ruia
项目描述:Exploit for CVE-2022-29582 targeting Google's Kernel CTF
项目链接:https://github.com/Ruia-ruia/CVE-2022-29582-Exploit
#CVE_2022
GitHub
GitHub - Ruia-ruia/CVE-2022-29582-Exploit: Exploit for CVE-2022-29582 targeting Google's Kernel CTF
Exploit for CVE-2022-29582 targeting Google's Kernel CTF - Ruia-ruia/CVE-2022-29582-Exploit
渗透/安全推送中心
创建者:cxzero
项目描述:CVE-2022-22965 Spring4Shell research & PoC
项目链接:https://github.com/cxzero/CVE-2022-22965-spring4shell
#CVE_2022 #cve_2022_22965 #spring_framework #spring4shell #spring4shell_poc
创建者:cxzero
项目描述:CVE-2022-22965 Spring4Shell research & PoC
项目链接:https://github.com/cxzero/CVE-2022-22965-spring4shell
#CVE_2022 #cve_2022_22965 #spring_framework #spring4shell #spring4shell_poc
GitHub
GitHub - cxzero/CVE-2022-22965-spring4shell: CVE-2022-22965 Spring4Shell research & PoC
CVE-2022-22965 Spring4Shell research & PoC. Contribute to cxzero/CVE-2022-22965-spring4shell development by creating an account on GitHub.
渗透/安全推送中心
创建者:jeffymcjeffface
项目描述:A Fullstack Academy Cybersecurity project examining the full cycle of the Follina (CVE-2022-30190) vulnerability, from exploit to detection and defense.
项目链接:https://github.com/jeffymcjeffface/five-nights-at-follina-s
#CVE_2022
创建者:jeffymcjeffface
项目描述:A Fullstack Academy Cybersecurity project examining the full cycle of the Follina (CVE-2022-30190) vulnerability, from exploit to detection and defense.
项目链接:https://github.com/jeffymcjeffface/five-nights-at-follina-s
#CVE_2022
GitHub
GitHub - jeffreybxu/five-nights-at-follina-s: A Fullstack Academy Cybersecurity project examining the full cycle of the Follina…
A Fullstack Academy Cybersecurity project examining the full cycle of the Follina (CVE-2022-30190) vulnerability, from exploit to detection and defense. - GitHub - jeffreybxu/five-nights-at-follina...
渗透/安全推送中心
创建者:W01fh4cker
项目描述:Serein工具的护网版,针对2022年护网(hvv)期间出现的漏洞编写。
项目链接:https://github.com/W01fh4cker/Serein_hvv
#漏洞
创建者:W01fh4cker
项目描述:Serein工具的护网版,针对2022年护网(hvv)期间出现的漏洞编写。
项目链接:https://github.com/W01fh4cker/Serein_hvv
#漏洞
GitHub
GitHub - W01fh4cker/Serein_hvv: Serein工具的护网版,针对2022年护网(hvv)期间出现的漏洞编写。
Serein工具的护网版,针对2022年护网(hvv)期间出现的漏洞编写。. Contribute to W01fh4cker/Serein_hvv development by creating an account on GitHub.
渗透/安全推送中心
创建者:W01fh4cker
项目描述:【解放双手】一款支持17种OA、19种CMS的批量漏洞检测利用工具。
项目链接:https://github.com/W01fh4cker/Karlin
#漏洞
创建者:W01fh4cker
项目描述:【解放双手】一款支持17种OA、19种CMS的批量漏洞检测利用工具。
项目链接:https://github.com/W01fh4cker/Karlin
#漏洞
GitHub
GitHub - W01fh4cker/Karlin: 【解放双手】一款支持17种OA、19种CMS的批量漏洞检测利用工具。
【解放双手】一款支持17种OA、19种CMS的批量漏洞检测利用工具。. Contribute to W01fh4cker/Karlin development by creating an account on GitHub.
渗透/安全推送中心
创建者:wwwuuid2com2
项目描述:2022年全新UI聚合支付系统四方源码4月最新更新安全升级修复XSS漏洞和补单漏洞新增诸多实用功能完美版
项目链接:https://github.com/wwwuuid2com2/c_2044
#漏洞
创建者:wwwuuid2com2
项目描述:2022年全新UI聚合支付系统四方源码4月最新更新安全升级修复XSS漏洞和补单漏洞新增诸多实用功能完美版
项目链接:https://github.com/wwwuuid2com2/c_2044
#漏洞
GitHub
GitHub - wwwuuid2com2/c_2044: 2022年全新UI聚合支付系统四方源码4月最新更新安全升级修复XSS漏洞和补单漏洞新增诸多实用功能完美版
2022年全新UI聚合支付系统四方源码4月最新更新安全升级修复XSS漏洞和补单漏洞新增诸多实用功能完美版 - GitHub - wwwuuid2com2/c_2044: 2022年全新UI聚合支付系统四方源码4月最新更新安全升级修复XSS漏洞和补单漏洞新增诸多实用功能完美版