渗透/安全推送中心
创建者:AchocolatechipPancake
项目描述:Utilizing Alternative Shellcode Execution Via Callbacks
项目链接:https://github.com/AchocolatechipPancake/FUD_x64_Loader
#shellcode
创建者:AchocolatechipPancake
项目描述:Utilizing Alternative Shellcode Execution Via Callbacks
项目链接:https://github.com/AchocolatechipPancake/FUD_x64_Loader
#shellcode
GitHub
GitHub - AchocolatechipPancake/FUD_x64_Loader: Utilizing Alternative Shellcode Execution Via Callbacks
Utilizing Alternative Shellcode Execution Via Callbacks - GitHub - AchocolatechipPancake/FUD_x64_Loader: Utilizing Alternative Shellcode Execution Via Callbacks
渗透/安全推送中心
创建者:francozappa
项目描述:BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]
项目链接:https://github.com/francozappa/blur
#CVE_2022 #bluetooth #bluetooth_le #bluetooth_low_energy #ctkd
创建者:francozappa
项目描述:BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]
项目链接:https://github.com/francozappa/blur
#CVE_2022 #bluetooth #bluetooth_le #bluetooth_low_energy #ctkd
GitHub
GitHub - francozappa/blur: BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE…
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361] - francozappa/blur
渗透/安全推送中心
创建者:VTFoundation
项目描述:A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
项目链接:https://github.com/VTFoundation/GodGenesis
#red_team
创建者:VTFoundation
项目描述:A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
项目链接:https://github.com/VTFoundation/GodGenesis
#red_team
GitHub
GitHub - VTFoundation/GodGenesis: A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to…
A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints. - GitHub - VTFoundation/GodGenesis: A Python3 based C2 ...
渗透/安全推送中心
创建者:Henkru
项目描述:In-memory token vault BOF for Cobalt Strike
项目链接:https://github.com/Henkru/cs-token-vault
#cobalt_strike
创建者:Henkru
项目描述:In-memory token vault BOF for Cobalt Strike
项目链接:https://github.com/Henkru/cs-token-vault
#cobalt_strike
GitHub
GitHub - Henkru/cs-token-vault: In-memory token vault BOF for Cobalt Strike
In-memory token vault BOF for Cobalt Strike. Contribute to Henkru/cs-token-vault development by creating an account on GitHub.
渗透/安全推送中心
创建者:lsecqt
项目描述:A powershell poc to load and automatically run Certify and Rubeus from memory.
项目链接:https://github.com/lsecqt/CVE-2022-26923-Powershell-POC
#CVE_2022
创建者:lsecqt
项目描述:A powershell poc to load and automatically run Certify and Rubeus from memory.
项目链接:https://github.com/lsecqt/CVE-2022-26923-Powershell-POC
#CVE_2022
GitHub
GitHub - lsecqt/CVE-2022-26923-Powershell-POC: A powershell poc to load and automatically run Certify and Rubeus from memory.
A powershell poc to load and automatically run Certify and Rubeus from memory. - lsecqt/CVE-2022-26923-Powershell-POC
渗透/安全推送中心
创建者:kyl1n0
项目描述:📖 Security 是一个由个人维护的安全知识库,包括但不限于 信息收集、SQL注入、文件上传
项目链接:https://github.com/kyl1n0/Cyber-Security-Notes
#信息收集
创建者:kyl1n0
项目描述:📖 Security 是一个由个人维护的安全知识库,包括但不限于 信息收集、SQL注入、文件上传
项目链接:https://github.com/kyl1n0/Cyber-Security-Notes
#信息收集
GitHub
GitHub - kyl1n0/Cyber-Security-Notes: 由个人维护的安全知识库,包括但不限于 信息收集、SQL注入、文件上传
由个人维护的安全知识库,包括但不限于 信息收集、SQL注入、文件上传. Contribute to kyl1n0/Cyber-Security-Notes development by creating an account on GitHub.
渗透/安全推送中心
创建者:N1arut
项目描述:Web Hacking and Red Teaming MindMap
项目链接:https://github.com/N1arut/Pentesting-Mind-Map
#red_team #penetration_testing #redteaming
创建者:N1arut
项目描述:Web Hacking and Red Teaming MindMap
项目链接:https://github.com/N1arut/Pentesting-Mind-Map
#red_team #penetration_testing #redteaming
GitHub
GitHub - N1arut/Pentesting-Mind-Map: Web Hacking and Red Teaming MindMap
Web Hacking and Red Teaming MindMap. Contribute to N1arut/Pentesting-Mind-Map development by creating an account on GitHub.
渗透/安全推送中心
创建者:bhassani
项目描述:EternalBlue suite remade in C/C++ which includes: MS17-010 Exploit, EternalBlue vulnerability detector, DoublePulsar detector and DoublePulsar Shellcode & DLL uploader
项目链接:https://github.com/bhassani/EternalBlueC
#shellcode
创建者:bhassani
项目描述:EternalBlue suite remade in C/C++ which includes: MS17-010 Exploit, EternalBlue vulnerability detector, DoublePulsar detector and DoublePulsar Shellcode & DLL uploader
项目链接:https://github.com/bhassani/EternalBlueC
#shellcode
GitHub
GitHub - bhassani/EternalBlueC: EternalBlue suite remade in C/C++ which includes: MS17-010 Exploit, EternalBlue vulnerability detector…
EternalBlue suite remade in C/C++ which includes: MS17-010 Exploit, EternalBlue vulnerability detector, DoublePulsar detector and DoublePulsar Shellcode & DLL uploader - bhassani/EternalBlueC
渗透/安全推送中心
创建者:ORCx41
项目描述:using the kct to run your shellcode the apt style
项目链接:https://github.com/ORCx41/KctHijackLib
#shellcode
创建者:ORCx41
项目描述:using the kct to run your shellcode the apt style
项目链接:https://github.com/ORCx41/KctHijackLib
#shellcode
GitHub
GitHub - ORCx41/KctHijackLib: using the kct to run your shellcode the apt style
using the kct to run your shellcode the apt style. Contribute to ORCx41/KctHijackLib development by creating an account on GitHub.
渗透/安全推送中心
创建者:ORCx41
项目描述:Using Thread Description To Hide Shellcodes
项目链接:https://github.com/ORCx41/T.D.P.
#shellcode
创建者:ORCx41
项目描述:Using Thread Description To Hide Shellcodes
项目链接:https://github.com/ORCx41/T.D.P.
#shellcode
渗透/安全推送中心
创建者:M4fiaB0y
项目描述:#Title: Sysax <= 5.53 SSH Username BoF Pre Auth RCE (Egghunter) #Author: Craig Freyman (@cd1zz) #OS Tested: XP SP3 32bit, 2003 Server SP2 (No DEP)
项目链接:https://github.com/M4fiaB0y/Sysax-multi-server-ssh-username-exploit
#rce
创建者:M4fiaB0y
项目描述:#Title: Sysax <= 5.53 SSH Username BoF Pre Auth RCE (Egghunter) #Author: Craig Freyman (@cd1zz) #OS Tested: XP SP3 32bit, 2003 Server SP2 (No DEP)
项目链接:https://github.com/M4fiaB0y/Sysax-multi-server-ssh-username-exploit
#rce
GitHub
GitHub - M4fiaB0y/Sysax-multi-server-ssh-username-exploit: #Title: Sysax <= 5.53 SSH Username BoF Pre Auth RCE (Egghunter) #Author:…
#Title: Sysax <= 5.53 SSH Username BoF Pre Auth RCE (Egghunter) #Author: Craig Freyman (@cd1zz) #OS Tested: XP SP3 32bit, 2003 Server SP2 (No DEP) - M4fiaB0y/Sysax-multi-server-ssh-username-exploit
渗透/安全推送中心
创建者:signorrayan
项目描述:Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
项目链接:https://github.com/signorrayan/RedTeam_toolkit
#red_team #cve_search #dir_scanner #django #nmap #offensive_scripts #offensivesecurity #penetration_testing #python #python3 #redteam_tools #service_discovery #verb_tampering #vulnerability_scanners
创建者:signorrayan
项目描述:Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
项目链接:https://github.com/signorrayan/RedTeam_toolkit
#red_team #cve_search #dir_scanner #django #nmap #offensive_scripts #offensivesecurity #penetration_testing #python #python3 #redteam_tools #service_discovery #verb_tampering #vulnerability_scanners
GitHub
GitHub - signorrayan/RedTeam_toolkit: Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive…
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together. - signorrayan/RedTeam_toolkit