GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-30078 Detection and Command Execution Script
URL:https://github.com/alperenugurlu/CVE-2024-30078-
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-30078 Detection and Command Execution Script
URL:https://github.com/alperenugurlu/CVE-2024-30078-
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Python script for get reverse shell with using CVE-2024-4577
URL:https://github.com/AlperenY-cs/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:Python script for get reverse shell with using CVE-2024-4577
URL:https://github.com/AlperenY-cs/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - AlperenY-cs/CVE-2024-4577: Create lab for CVE-2024-4577
Create lab for CVE-2024-4577. Contribute to AlperenY-cs/CVE-2024-4577 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Python script for get reverse shell with using CVE-2024-4577
URL:https://github.com/team-MineDEV/CVE-2024-26229
标签:#CVE-2024
更新了:CVE-2024
描述:Python script for get reverse shell with using CVE-2024-4577
URL:https://github.com/team-MineDEV/CVE-2024-26229
标签:#CVE-2024
GitHub
GitHub - team-MineDEV/CVE-2024-26229: Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并…
Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYST...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23692 exp
URL:https://github.com/Tupler/CVE-2024-23692-exp
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23692 exp
URL:https://github.com/Tupler/CVE-2024-23692-exp
标签:#CVE-2024
GitHub
GitHub - Tupler/CVE-2024-23692-exp: CVE-2024-23692 exp
CVE-2024-23692 exp. Contribute to Tupler/CVE-2024-23692-exp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:Extraction and decryption of webshell traffic from packet captures
URL:https://github.com/rb3nzr/WSTDecryptor
标签:#webshell
更新了:webshell
描述:Extraction and decryption of webshell traffic from packet captures
URL:https://github.com/rb3nzr/WSTDecryptor
标签:#webshell
GitHub
GitHub - rb3nzr/WSTDecryptor: Extraction and decryption of webshell traffic from packet captures
Extraction and decryption of webshell traffic from packet captures - rb3nzr/WSTDecryptor
GitHub监控消息提醒!!!
更新了:代码审计
描述:富婆系列,代码审计辅助工具,致力于解放大脑,方便双手
URL:https://github.com/novysodope/javaeasyscan
标签:#代码审计
更新了:代码审计
描述:富婆系列,代码审计辅助工具,致力于解放大脑,方便双手
URL:https://github.com/novysodope/javaeasyscan
标签:#代码审计
GitHub
GitHub - novysodope/javaeasyscan: javaeasyscanner - 富婆系列,代码审计辅助工具,致力于解放大脑,方便双手
javaeasyscanner - 富婆系列,代码审计辅助工具,致力于解放大脑,方便双手. Contribute to novysodope/javaeasyscan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:An edited version of H4RK3NZ0's Wifi Mouse 1.7.8.5 RCE exploit, patching the errors and adding functionality.
URL:https://github.com/EduWoldhuis/Wifi_mouse_1.7.8.5_exploit
标签:#RCE
更新了:RCE
描述:An edited version of H4RK3NZ0's Wifi Mouse 1.7.8.5 RCE exploit, patching the errors and adding functionality.
URL:https://github.com/EduWoldhuis/Wifi_mouse_1.7.8.5_exploit
标签:#RCE
GitHub
GitHub - EduWoldhuis/Wifi_mouse_1.7.8.5_exploit: An edited version of H4RK3NZ0's Wifi Mouse 1.7.8.5 RCE exploit, patching the errors…
An edited version of H4RK3NZ0's Wifi Mouse 1.7.8.5 RCE exploit, patching the errors and adding functionality. - EduWoldhuis/Wifi_mouse_1.7.8.5_exploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
URL:https://github.com/vin01/poc-cve-2024-38396
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
URL:https://github.com/vin01/poc-cve-2024-38396
标签:#CVE-2024
GitHub
GitHub - vin01/poc-cve-2024-38396: PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution - vin01/poc-cve-2024-38396
GitHub监控消息提醒!!!
更新了:RCE
描述:Webserver we use for our RCE
URL:https://github.com/Solara-RCE/webserver
标签:#RCE
更新了:RCE
描述:Webserver we use for our RCE
URL:https://github.com/Solara-RCE/webserver
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit of CVE-2024-0757 (Insert or Embed Articulate Content into WordPress <= 4.3000000023 - Authenticated - Upload to RCE)
URL:https://github.com/hunThubSpace/CVE-2024-0757
标签:#RCE
更新了:RCE
描述:Exploit of CVE-2024-0757 (Insert or Embed Articulate Content into WordPress <= 4.3000000023 - Authenticated - Upload to RCE)
URL:https://github.com/hunThubSpace/CVE-2024-0757
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)
URL:https://github.com/hunThubSpace/CVE-2024-0757-Exploit
标签:#CVE-2024
更新了:CVE-2024
描述:A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)
URL:https://github.com/hunThubSpace/CVE-2024-0757-Exploit
标签:#CVE-2024
GitHub
GitHub - hunThubSpace/CVE-2024-0757-Exploit: A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress…
A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE) - hunThubSpace/CVE-2024-0757-Exploit
GitHub监控消息提醒!!!
更新了:免杀
描述:php大马,asp大马,中国菜刀,免杀PHP大马,PHP大马下载,PHP木马下载,中国菜刀下载
URL:https://github.com/vipfox8/webshell
标签:#免杀
更新了:免杀
描述:php大马,asp大马,中国菜刀,免杀PHP大马,PHP大马下载,PHP木马下载,中国菜刀下载
URL:https://github.com/vipfox8/webshell
标签:#免杀
GitHub
GitHub - vipfox8/webshell: php大马,asp大马,中国菜刀,免杀PHP大马,PHP大马下载,PHP木马下载,中国菜刀下载
php大马,asp大马,中国菜刀,免杀PHP大马,PHP大马下载,PHP木马下载,中国菜刀下载. Contribute to vipfox8/webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内存马
描述:Python内存马管理工具 Python MemShell
URL:https://github.com/orzchen/PyMemShell
标签:#内存马
更新了:内存马
描述:Python内存马管理工具 Python MemShell
URL:https://github.com/orzchen/PyMemShell
标签:#内存马
GitHub
GitHub - orzchen/PyMemShell: Python内存马管理工具 Python MemShell
Python内存马管理工具 Python MemShell. Contribute to orzchen/PyMemShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23692
URL:https://github.com/BBD-YZZ/CVE-2024-23692
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23692
URL:https://github.com/BBD-YZZ/CVE-2024-23692
标签:#CVE-2024
GitHub
GitHub - BBD-YZZ/CVE-2024-23692: CVE-2024-23692
CVE-2024-23692. Contribute to BBD-YZZ/CVE-2024-23692 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:弱口令检测、 漏洞扫描、端口扫描(协议识别,组件识别)、web目录扫描、等保模拟定级、自动化运维、等保工具(网络安全等级保护现场测评工具)内置3级等保核查命令、基线核查工具、键盘记录器
URL:https://github.com/Bear1009/VulDHGCN
标签:#漏洞检测
更新了:漏洞检测
描述:弱口令检测、 漏洞扫描、端口扫描(协议识别,组件识别)、web目录扫描、等保模拟定级、自动化运维、等保工具(网络安全等级保护现场测评工具)内置3级等保核查命令、基线核查工具、键盘记录器
URL:https://github.com/Bear1009/VulDHGCN
标签:#漏洞检测
GitHub
GitHub - Bear1009/VulDHGCN: 针对源代码漏洞检测领域中存在的挑战,特别是现有方法在代码图精准嵌入和捕获其复杂层次结构方面的不足,提出了一种创新的基于双曲图卷积神经网络(Hyperbolic Graph Convolutional…
针对源代码漏洞检测领域中存在的挑战,特别是现有方法在代码图精准嵌入和捕获其复杂层次结构方面的不足,提出了一种创新的基于双曲图卷积神经网络(Hyperbolic Graph Convolutional Neural Network)的切片级源代码漏洞检测方法,称为VulDHGCN。该方法融合了图卷积神经网络和双曲几何的强大表达能力,更全面地嵌入和保留了源代码的结构特征,有效降低了代码图嵌入过程...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/snyk-labs/pdfjs-vuln-demo
标签:#CVE-2024
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/snyk-labs/pdfjs-vuln-demo
标签:#CVE-2024
GitHub
GitHub - snyk-labs/pdfjs-vuln-demo: This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability…
This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367 - snyk-labs/pdfjs-vuln-demo
GitHub监控消息提醒!!!
更新了:Red Team
描述:A ML Model That Predict The Percentage of Winning for Each Blue And Red Team in League of Legends
URL:https://github.com/1FarZ1/league-of-legends-win-predector
标签:#Red Team
更新了:Red Team
描述:A ML Model That Predict The Percentage of Winning for Each Blue And Red Team in League of Legends
URL:https://github.com/1FarZ1/league-of-legends-win-predector
标签:#Red Team
GitHub
GitHub - 1FarZ1/league-of-legends-win-predector: A ML Model That Predict The Percentage of Winning for Each Blue And Red Team in…
A ML Model That Predict The Percentage of Winning for Each Blue And Red Team in League of Legends - GitHub - 1FarZ1/league-of-legends-win-predector: A ML Model That Predict The Percentage of Winni...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4577 POC
URL:https://github.com/VictorShem/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4577 POC
URL:https://github.com/VictorShem/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - VictorShem/CVE-2024-4577: CVE-2024-4577 POC
CVE-2024-4577 POC. Contribute to VictorShem/CVE-2024-4577 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:simple and useful webshells wich you can use for challenge your firewall .
URL:https://github.com/awsox/403-bypass-webshell
标签:#webshell
更新了:webshell
描述:simple and useful webshells wich you can use for challenge your firewall .
URL:https://github.com/awsox/403-bypass-webshell
标签:#webshell
GitHub
GitHub - awsox/403-bypass-webshells: simple and useful webshells wich you can use for challenge your firewall .
simple and useful webshells wich you can use for challenge your firewall . - awsox/403-bypass-webshells