渗透/安全推送中心
创建者:Ppamo
项目描述:Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad de Santiago, agosto 2022.
项目链接:https://github.com/Ppamo/poc_usach_phishibg_lab_202208
#red_team
创建者:Ppamo
项目描述:Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad de Santiago, agosto 2022.
项目链接:https://github.com/Ppamo/poc_usach_phishibg_lab_202208
#red_team
GitHub
GitHub - Ppamo/poc_usach_phishibg_lab_202208: Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad…
Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad de Santiago, agosto 2022. - GitHub - Ppamo/poc_usach_phishibg_lab_202208: Laboratorio de phishing, para curs...
渗透/安全推送中心
创建者:CodeXTF2
项目描述:Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles
项目链接:https://github.com/CodeXTF2/Burp2Malleable
#cobalt_strike #burpsuite #cobalt_strike #cobaltstrike #malleablec2
创建者:CodeXTF2
项目描述:Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles
项目链接:https://github.com/CodeXTF2/Burp2Malleable
#cobalt_strike #burpsuite #cobalt_strike #cobaltstrike #malleablec2
GitHub
GitHub - CodeXTF2/Burp2Malleable: Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable…
Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles - CodeXTF2/Burp2Malleable
渗透/安全推送中心
创建者:EasyHax
项目描述:assembly in the middle - detours native function from c#, executes shellcode before calling the hook routine
项目链接:https://github.com/EasyHax/AITM
#shellcode
创建者:EasyHax
项目描述:assembly in the middle - detours native function from c#, executes shellcode before calling the hook routine
项目链接:https://github.com/EasyHax/AITM
#shellcode
GitHub
GitHub - EasyHax/AITM: assembly in the middle - detours native function from c#, executes shellcode before calling the hook routine
assembly in the middle - detours native function from c#, executes shellcode before calling the hook routine - GitHub - EasyHax/AITM: assembly in the middle - detours native function from c#, execu...
渗透/安全推送中心
创建者:Ppamo
项目描述:Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad de Santiago, agosto 2022.
项目链接:https://github.com/Ppamo/usach_phishing_lab_202208
#red_team
创建者:Ppamo
项目描述:Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad de Santiago, agosto 2022.
项目链接:https://github.com/Ppamo/usach_phishing_lab_202208
#red_team
GitHub
GitHub - Ppamo/usach_phishing_lab_202208: Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad…
Laboratorio de phishing, para curso Preparación de Campañas Red Team, de una Universidad de Santiago, agosto 2022. - Ppamo/usach_phishing_lab_202208
渗透/安全推送中心
创建者:grantdadams
项目描述:TMB based age-structured multi-species model. Estimation, simulation, management strategy evaluation.
项目链接:https://github.com/grantdadams/Rceattle
#rce
创建者:grantdadams
项目描述:TMB based age-structured multi-species model. Estimation, simulation, management strategy evaluation.
项目链接:https://github.com/grantdadams/Rceattle
#rce
GitHub
GitHub - grantdadams/Rceattle: TMB based age-structured single- and multi-species model. Estimation, simulation, management strategy…
TMB based age-structured single- and multi-species model. Estimation, simulation, management strategy evaluation. - grantdadams/Rceattle
渗透/安全推送中心
创建者:Daro1967
项目描述:CVE-2022-24500 Windows SMB Unauthenticated Remote Code Execution Vulnerability
项目链接:https://github.com/Daro1967/CVE-2022-24500-MASS-RCE
#CVE_2022
创建者:Daro1967
项目描述:CVE-2022-24500 Windows SMB Unauthenticated Remote Code Execution Vulnerability
项目链接:https://github.com/Daro1967/CVE-2022-24500-MASS-RCE
#CVE_2022
渗透/安全推送中心
创建者:bor8
项目描述:https://nvd.nist.gov/vuln/detail/CVE-2022-34169
项目链接:https://github.com/bor8/CVE-2022-34169
#CVE_2022
创建者:bor8
项目描述:https://nvd.nist.gov/vuln/detail/CVE-2022-34169
项目链接:https://github.com/bor8/CVE-2022-34169
#CVE_2022
GitHub
GitHub - bor8/CVE-2022-34169: https://nvd.nist.gov/vuln/detail/CVE-2022-34169
https://nvd.nist.gov/vuln/detail/CVE-2022-34169. Contribute to bor8/CVE-2022-34169 development by creating an account on GitHub.
渗透/安全推送中心
创建者:burpheart
项目描述:模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.
项目链接:https://github.com/burpheart/CS_mock
#cobalt_strike #cobalt_strike #cve_2021_36798
创建者:burpheart
项目描述:模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.
项目链接:https://github.com/burpheart/CS_mock
#cobalt_strike #cobalt_strike #cve_2021_36798
GitHub
GitHub - burpheart/CS_mock: 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.
模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet. - GitHub - burpheart/CS_mock: 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.
渗透/安全推送中心
创建者:Ziggy78
项目描述:metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445
项目链接:https://github.com/Ziggy78/CVE-2022-26809-MASS-RCE
#CVE_2022
创建者:Ziggy78
项目描述:metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445
项目链接:https://github.com/Ziggy78/CVE-2022-26809-MASS-RCE
#CVE_2022
渗透/安全推送中心
创建者:BaizeSec
项目描述:白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目
项目链接:https://github.com/BaizeSec/bylibrary
#漏洞 #baize #exp #poc #sec #security
创建者:BaizeSec
项目描述:白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目
项目链接:https://github.com/BaizeSec/bylibrary
#漏洞 #baize #exp #poc #sec #security
GitHub
GitHub - BaizeSec/bylibrary: 白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目
白阁文库是白泽Sec安全团队维护的一个漏洞POC和EXP公开项目. Contribute to BaizeSec/bylibrary development by creating an account on GitHub.
渗透/安全推送中心
创建者:jbaines-r7
项目描述:A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)
项目链接:https://github.com/jbaines-r7/theway
#CVE_2022 #asa #asdm #cisco #cve_2022_20829 #exploit #poc
创建者:jbaines-r7
项目描述:A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)
项目链接:https://github.com/jbaines-r7/theway
#CVE_2022 #asa #asdm #cisco #cve_2022_20829 #exploit #poc
GitHub
GitHub - jbaines-r7/theway: A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)
A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829) - jbaines-r7/theway
渗透/安全推送中心
创建者:snovvcrash
项目描述:Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL
项目链接:https://github.com/snovvcrash/DInjector
#shellcode #dinvoke #shellcode_injection #shellcode_loader
创建者:snovvcrash
项目描述:Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL
项目链接:https://github.com/snovvcrash/DInjector
#shellcode #dinvoke #shellcode_injection #shellcode_loader
渗透/安全推送中心
创建者:ScriptIdiot
项目描述:An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process.
项目链接:https://github.com/ScriptIdiot/patchit
#cobalt_strike
创建者:ScriptIdiot
项目描述:An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process.
项目链接:https://github.com/ScriptIdiot/patchit
#cobalt_strike
GitHub
GitHub - ScriptIdiot/BOF-patchit: An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both…
An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are available. - ScriptIdiot/BOF-patchit