GitHub监控消息提醒!!!
更新了:CVE-2024
描述:https://nvd.nist.gov/vuln/detail/CVE-2024-24576
URL:https://github.com/mishalhossin/CVE-2024-24576-PoC-Python
标签:#CVE-2024
更新了:CVE-2024
描述:https://nvd.nist.gov/vuln/detail/CVE-2024-24576
URL:https://github.com/mishalhossin/CVE-2024-24576-PoC-Python
标签:#CVE-2024
GitHub
GitHub - mishalhossin/CVE-2024-24576-PoC-Python: https://nvd.nist.gov/vuln/detail/CVE-2024-24576
https://nvd.nist.gov/vuln/detail/CVE-2024-24576. Contribute to mishalhossin/CVE-2024-24576-PoC-Python development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-24576 PoC in Julia
URL:https://github.com/lpn/CVE-2024-24576.jl
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-24576 PoC in Julia
URL:https://github.com/lpn/CVE-2024-24576.jl
标签:#CVE-2024
GitHub
GitHub - lpn/CVE-2024-24576.jl: Simple CVE-2024-24576 PoC in Julia
Simple CVE-2024-24576 PoC in Julia. Contribute to lpn/CVE-2024-24576.jl development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-27983 this repository builds up a vulnerable HTTP2 Node.js server (`server-nossl.js`) based on CVE-2024-27983 which exploits a continuation flood vulnerability in HTTP2 servers.
URL:https://github.com/lirantal/CVE-2024-27983-nodejs-http2
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-27983 this repository builds up a vulnerable HTTP2 Node.js server (`server-nossl.js`) based on CVE-2024-27983 which exploits a continuation flood vulnerability in HTTP2 servers.
URL:https://github.com/lirantal/CVE-2024-27983-nodejs-http2
标签:#CVE-2024
GitHub
GitHub - lirantal/CVE-2024-27983-nodejs-http2: CVE-2024-27983 this repository builds up a vulnerable HTTP2 Node.js server (`server…
CVE-2024-27983 this repository builds up a vulnerable HTTP2 Node.js server (`server-nossl.js`) based on CVE-2024-27983 which exploits a continuation flood vulnerability in HTTP2 servers. - lirantal...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:这是一篇记录如何从建仓开始到最后安全测试完整流程的笔记,使用的`spring`生态,目的是为`spring`的基础后端开发及后期渗透测试打一个模板
URL:https://github.com/23DAY01/blog_23DAY
标签:#渗透测试
更新了:渗透测试
描述:这是一篇记录如何从建仓开始到最后安全测试完整流程的笔记,使用的`spring`生态,目的是为`spring`的基础后端开发及后期渗透测试打一个模板
URL:https://github.com/23DAY01/blog_23DAY
标签:#渗透测试
GitHub
GitHub - 23DAY01/blog_23DAY: 这是一篇记录如何从建仓开始到最后安全测试完整流程的笔记,使用的`spring`生态,目的是为`spring`的基础后端开发及后期渗透测试打一个模板
这是一篇记录如何从建仓开始到最后安全测试完整流程的笔记,使用的`spring`生态,目的是为`spring`的基础后端开发及后期渗透测试打一个模板 - 23DAY01/blog_23DAY
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Quick example of CVE-2024-24576 written in java. Java team announced they are not going to patch this vournabiliti and good :D
URL:https://github.com/jakbyjakub/java-CVE-2024-24576-exploit
标签:#CVE-2024
更新了:CVE-2024
描述:Quick example of CVE-2024-24576 written in java. Java team announced they are not going to patch this vournabiliti and good :D
URL:https://github.com/jakbyjakub/java-CVE-2024-24576-exploit
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:webshell
描述:A simple python webshell that instanciates a python webserver that you can execute shell commands on
URL:https://github.com/Franco-Mezzarapa/python-webshell
标签:#webshell
更新了:webshell
描述:A simple python webshell that instanciates a python webserver that you can execute shell commands on
URL:https://github.com/Franco-Mezzarapa/python-webshell
标签:#webshell
GitHub
GitHub - Franco-Mezzarapa/python-webshell: A simple python webshell that instanciates a python webserver that you can execute shell…
A simple python webshell that instanciates a python webserver that you can execute shell commands on - Franco-Mezzarapa/python-webshell
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/kerberoshacker/CVE-2024-3400-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/kerberoshacker/CVE-2024-3400-POC
标签:#CVE-2024
👎1
GitHub监控消息提醒!!!
更新了:Red Team
描述:My Red Team Notes
URL:https://github.com/ninjaa-exe/Red-Team-Notes
标签:#Red Team
更新了:Red Team
描述:My Red Team Notes
URL:https://github.com/ninjaa-exe/Red-Team-Notes
标签:#Red Team
GitHub
GitHub - ninjaa-exe/Red-Team-Notes: My Red Team Notes
My Red Team Notes. Contribute to ninjaa-exe/Red-Team-Notes development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A simple bash script to check for evidence of compromise related to CVE-2024-3400
URL:https://github.com/MurrayR0123/CVE-2024-3400_compromise_checker
标签:#CVE-2024
更新了:CVE-2024
描述:A simple bash script to check for evidence of compromise related to CVE-2024-3400
URL:https://github.com/MurrayR0123/CVE-2024-3400_compromise_checker
标签:#CVE-2024
GitHub
GitHub - MurrayR0123/CVE-2024-3400-Compromise-Checker: A simple bash script to check for evidence of compromise related to CVE…
A simple bash script to check for evidence of compromise related to CVE-2024-3400 - MurrayR0123/CVE-2024-3400-Compromise-Checker
GitHub监控消息提醒!!!
更新了:sql注入
描述:MyBatis sql注入、多租户、逻辑删除、数据权限插件-SqlHelper
URL:https://github.com/heykb/mybatis-sqlhelper
标签:#sql注入
更新了:sql注入
描述:MyBatis sql注入、多租户、逻辑删除、数据权限插件-SqlHelper
URL:https://github.com/heykb/mybatis-sqlhelper
标签:#sql注入
GitHub
GitHub - heykb/mybatis-sqlhelper: MyBatis sql注入、多租户、逻辑删除、数据权限插件-SqlHelper
MyBatis sql注入、多租户、逻辑删除、数据权限插件-SqlHelper. Contribute to heykb/mybatis-sqlhelper development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A simple bash script to check for evidence of compromise related to CVE-2024-3400
URL:https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker
标签:#CVE-2024
更新了:CVE-2024
描述:A simple bash script to check for evidence of compromise related to CVE-2024-3400
URL:https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker
标签:#CVE-2024
GitHub
GitHub - MurrayR0123/CVE-2024-3400-Compromise-Checker: A simple bash script to check for evidence of compromise related to CVE…
A simple bash script to check for evidence of compromise related to CVE-2024-3400 - MurrayR0123/CVE-2024-3400-Compromise-Checker
GitHub监控消息提醒!!!
更新了:代码审计
描述:miniprogram track 是用于小程序安全审计的工具包(反编译、调试、代码审计)
URL:https://github.com/AEPKILL/miniprogram-track
标签:#代码审计
更新了:代码审计
描述:miniprogram track 是用于小程序安全审计的工具包(反编译、调试、代码审计)
URL:https://github.com/AEPKILL/miniprogram-track
标签:#代码审计
GitHub
GitHub - AEPKILL/miniprogram-track: miniprogram track 是用于小程序安全审计的工具包(反编译、调试、代码审计)
miniprogram track 是用于小程序安全审计的工具包(反编译、调试、代码审计). Contribute to AEPKILL/miniprogram-track development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/battleoverflow/apache-traversal
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/battleoverflow/apache-traversal
标签:#RCE
GitHub
GitHub - battleoverflow/apache-traversal: This exploit is based on a few CVE vulnerabilities affecting Apache 2.4.49. We use URL…
This exploit is based on a few CVE vulnerabilities affecting Apache 2.4.49. We use URL-encoded characters to access certain files or otherwise restricted resources on the server. Possible RCE on ce...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-31734
URL:https://github.com/HBLocker/CVE-2024-31734
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-31734
URL:https://github.com/HBLocker/CVE-2024-31734
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:免杀
描述:GoBypassAV是一款用Go语言编写的免杀工具,支持自动化随机加解密,食用方便,简单易上手。
URL:https://github.com/A-little-dragon/GoBypassAV
标签:#免杀
更新了:免杀
描述:GoBypassAV是一款用Go语言编写的免杀工具,支持自动化随机加解密,食用方便,简单易上手。
URL:https://github.com/A-little-dragon/GoBypassAV
标签:#免杀
GitHub
GitHub - A-little-dragon/GoBypassAV: GoBypassAV是一款用Go语言编写的免杀工具,支持自动化随机加解密,食用方便,简单易上手。
GoBypassAV是一款用Go语言编写的免杀工具,支持自动化随机加解密,食用方便,简单易上手。. Contribute to A-little-dragon/GoBypassAV development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/kerberoshacker2/CVE-2024-3400-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/kerberoshacker2/CVE-2024-3400-POC
标签:#CVE-2024
👎1
GitHub监控消息提醒!!!
更新了:Red Team
描述:基于 chatgpt-web 兼容 LLM Red Team 项目下所有的 free-api 以及 one-api 或者 new-api提供的接口和 key
URL:https://github.com/SuYxh/chatgpt-web-llm-red-team
标签:#Red Team
更新了:Red Team
描述:基于 chatgpt-web 兼容 LLM Red Team 项目下所有的 free-api 以及 one-api 或者 new-api提供的接口和 key
URL:https://github.com/SuYxh/chatgpt-web-llm-red-team
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/Symbolexe/CVE-2024-1642470
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/Symbolexe/CVE-2024-1642470
标签:#CVE-2024
GitHub
GitHub - Symbolexe/CVE-2024-1642470: CVE-2024-1642470 is a critical vulnerability discovered in the Windows USB Generic Parent…
CVE-2024-1642470 is a critical vulnerability discovered in the Windows USB Generic Parent Driver. The vulnerability arises due to improper input validation within the driver's IOCTL handlin...