GitHub监控消息提醒!!!
更新了:CVE-2024
描述: env of CVE-2024-22243&CVE-2024-22234
URL:https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234
标签:#CVE-2024
更新了:CVE-2024
描述: env of CVE-2024-22243&CVE-2024-22234
URL:https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234
标签:#CVE-2024
GitHub
GitHub - shellfeel/CVE-2024-22243-CVE-2024-22234: env of CVE-2024-22243&CVE-2024-22234
env of CVE-2024-22243&CVE-2024-22234. Contribute to shellfeel/CVE-2024-22243-CVE-2024-22234 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Python script to automate generic gadget chain from CVE-2024-1651. There's missed length and nullbytes URL Encoding.
URL:https://github.com/sharpicx/CVE-2024-1651-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Python script to automate generic gadget chain from CVE-2024-1651. There's missed length and nullbytes URL Encoding.
URL:https://github.com/sharpicx/CVE-2024-1651-PoC
标签:#CVE-2024
GitHub
GitHub - sharpicx/CVE-2024-1651-PoC: Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.
Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit. - sharpicx/CVE-2024-1651-PoC
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Python script to automate generic gadget chain from CVE-2024-1651. There's missed length and nullbytes URL Encoding.
URL:https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
标签:#CVE-2024
更新了:CVE-2024
描述:Python script to automate generic gadget chain from CVE-2024-1651. There's missed length and nullbytes URL Encoding.
URL:https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
标签:#CVE-2024
GitHub
GitHub - ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability: Bu betik, Microsoft Outlook'ta…
Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırı...
GitHub监控消息提醒!!!
更新了:绕过
描述:动态化AppIcon示例,分别包含利用runtime去掉弹窗、使用IMP绕过消息转发机制直接调用从而避免弹窗
URL:https://github.com/Sfh03031/DynamicAppIcon
标签:#绕过
更新了:绕过
描述:动态化AppIcon示例,分别包含利用runtime去掉弹窗、使用IMP绕过消息转发机制直接调用从而避免弹窗
URL:https://github.com/Sfh03031/DynamicAppIcon
标签:#绕过
GitHub
GitHub - Sfh03031/DynamicAppIcon: 动态化AppIcon示例,分别包含利用runtime去掉弹窗、使用IMP绕过消息转发机制直接调用从而避免弹窗
动态化AppIcon示例,分别包含利用runtime去掉弹窗、使用IMP绕过消息转发机制直接调用从而避免弹窗 - Sfh03031/DynamicAppIcon
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability
URL:https://github.com/HussainFathy/CVE-2024-1709
标签:#CVE-2024
更新了:CVE-2024
描述:A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability
URL:https://github.com/HussainFathy/CVE-2024-1709
标签:#CVE-2024
GitHub
GitHub - HussainFathy/CVE-2024-1709: A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability
A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability - HussainFathy/CVE-2024-1709
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-21887 Exploitation with Ngrok Reverse Shell
URL:https://github.com/pwniel/ivanti_shell
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-21887 Exploitation with Ngrok Reverse Shell
URL:https://github.com/pwniel/ivanti_shell
标签:#CVE-2024
GitHub
GitHub - pwniel/ivanti_shell: CVE-2024-21887 Exploitation with Ngrok Reverse Shell
CVE-2024-21887 Exploitation with Ngrok Reverse Shell - pwniel/ivanti_shell
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2020-10189: Microsoft Windows SMBv3 Remote Code Execution (RCE)
URL:https://github.com/BLACKpwn/Remote_Code_Execution-
标签:#RCE
更新了:RCE
描述:CVE-2020-10189: Microsoft Windows SMBv3 Remote Code Execution (RCE)
URL:https://github.com/BLACKpwn/Remote_Code_Execution-
标签:#RCE
GitHub
GitHub - BLACKpwn/Remote_Code_Execution-
Contribute to BLACKpwn/Remote_Code_Execution- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This module implements a shell to exploit a RCE in umbraco CMS.
URL:https://github.com/mauricelambert/Shell-Exploit-Umbraco
标签:#RCE
更新了:RCE
描述:This module implements a shell to exploit a RCE in umbraco CMS.
URL:https://github.com/mauricelambert/Shell-Exploit-Umbraco
标签:#RCE
GitHub
GitHub - mauricelambert/Shell-Exploit-Umbraco: This module implements a shell to exploit a RCE in umbraco CMS.
This module implements a shell to exploit a RCE in umbraco CMS. - mauricelambert/Shell-Exploit-Umbraco
GitHub监控消息提醒!!!
更新了:RCE
描述:A multi-threaded Remote Code Execution (RCE) Server implemented in C
URL:https://github.com/anpa6841/remote-code-execution
标签:#RCE
更新了:RCE
描述:A multi-threaded Remote Code Execution (RCE) Server implemented in C
URL:https://github.com/anpa6841/remote-code-execution
标签:#RCE
GitHub
GitHub - anpa6841/rce-server
Contribute to anpa6841/rce-server development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:TangGo测试平台是无糖信息技术有限公司集多年渗透测试实战经验设计和开发的国产化综合性测试平台,为软件测试、网络安全从业人员提供强大且易用的测试工具及多人协同的工作环境,主要用于Web站点的功能测试、安全测试和安全评估。
URL:https://github.com/TangGolang/TangGo
标签:#渗透测试
更新了:渗透测试
描述:TangGo测试平台是无糖信息技术有限公司集多年渗透测试实战经验设计和开发的国产化综合性测试平台,为软件测试、网络安全从业人员提供强大且易用的测试工具及多人协同的工作环境,主要用于Web站点的功能测试、安全测试和安全评估。
URL:https://github.com/TangGolang/TangGo
标签:#渗透测试
GitHub
GitHub - TangGolang/TangGo: TangGo测试平台是无糖信息技术有限公司集多年渗透测试实战经验设计和开发的国产化综合性测试平台,为软件测试、网络安全从业人员提供强大且易用的测试工具及多人协同的工作环境,主要用于Web站点的功能测试、安全测试和安全评估。
TangGo测试平台是无糖信息技术有限公司集多年渗透测试实战经验设计和开发的国产化综合性测试平台,为软件测试、网络安全从业人员提供强大且易用的测试工具及多人协同的工作环境,主要用于Web站点的功能测试、安全测试和安全评估。 - TangGolang/TangGo
GitHub监控消息提醒!!!
更新了:Red Team
描述:Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps, and Continuous Red Teaming (CART).
URL:https://github.com/ErdemOzgen/blackdagger
标签:#Red Team
更新了:Red Team
描述:Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps, and Continuous Red Teaming (CART).
URL:https://github.com/ErdemOzgen/blackdagger
标签:#Red Team
GitHub
GitHub - ErdemOzgen/blackdagger: Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps…
Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps, and Continuous Red Teaming (CART). - ErdemOzgen/blackdagger
GitHub监控消息提醒!!!
更新了:免杀
描述:用于Webshell木马免杀、流量加密传输
URL:https://github.com/marrysaved/xnxxsexmovies.ru-Exploring-teen-sexuality-from-masturbation-to-creampie-movies
标签:#免杀
更新了:免杀
描述:用于Webshell木马免杀、流量加密传输
URL:https://github.com/marrysaved/xnxxsexmovies.ru-Exploring-teen-sexuality-from-masturbation-to-creampie-movies
标签:#免杀
GitHub监控消息提醒!!!
更新了:RCE
描述:A Craft CMS vulnerability that allows Remote Code Execution (RCE).
URL:https://github.com/acesoyeo/CVE-2023-41892
标签:#RCE
更新了:RCE
描述:A Craft CMS vulnerability that allows Remote Code Execution (RCE).
URL:https://github.com/acesoyeo/CVE-2023-41892
标签:#RCE
GitHub
GitHub - acesoyeo/CVE-2023-41892: A Craft CMS vulnerability that allows Remote Code Execution (RCE).
A Craft CMS vulnerability that allows Remote Code Execution (RCE). - acesoyeo/CVE-2023-41892
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Auto exploitation tool for CVE-2024-24401.
URL:https://github.com/MAWK0235/CVE-2024-24401
标签:#CVE-2024
更新了:CVE-2024
描述:Auto exploitation tool for CVE-2024-24401.
URL:https://github.com/MAWK0235/CVE-2024-24401
标签:#CVE-2024
GitHub
GitHub - MAWK0235/CVE-2024-24401: Auto exploitation tool for CVE-2024-24401.
Auto exploitation tool for CVE-2024-24401. . Contribute to MAWK0235/CVE-2024-24401 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypassav
描述:Cobalt Strike plugin
URL:https://github.com/yutianqaq/CSx4Ldr
标签:#bypassav
更新了:bypassav
描述:Cobalt Strike plugin
URL:https://github.com/yutianqaq/CSx4Ldr
标签:#bypassav
GitHub监控消息提醒!!!
更新了:漏洞挖掘
描述:基于Ghidra反编译工具的p-code中间码,实现iot固件的自动化的漏洞挖掘,这个脚本只实现了任意命令执行的漏洞挖掘,使用中间码索引漏洞调用链,成功索引处则表示为潜在漏洞,后续需要人工确认漏洞是否为真。
URL:https://github.com/MiniMangosteen/MyGhidraScripts
标签:#漏洞挖掘
更新了:漏洞挖掘
描述:基于Ghidra反编译工具的p-code中间码,实现iot固件的自动化的漏洞挖掘,这个脚本只实现了任意命令执行的漏洞挖掘,使用中间码索引漏洞调用链,成功索引处则表示为潜在漏洞,后续需要人工确认漏洞是否为真。
URL:https://github.com/MiniMangosteen/MyGhidraScripts
标签:#漏洞挖掘
GitHub
GitHub - MiniMangosteen/MyGhidraScripts: 基于Ghidra反编译工具的p-code中间码,实现iot固件的自动化的漏洞挖掘,这个脚本只实现了任意命令执行的漏洞挖掘,使用中间码索引漏洞调用链,成功索引处则表示为潜在…
基于Ghidra反编译工具的p-code中间码,实现iot固件的自动化的漏洞挖掘,这个脚本只实现了任意命令执行的漏洞挖掘,使用中间码索引漏洞调用链,成功索引处则表示为潜在漏洞,后续需要人工确认漏洞是否为真。 - MiniMangosteen/MyGhidraScripts