GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34102: Unauthenticated Magento XXE
URL:https://github.com/th3gokul/CVE-2024-34102
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34102: Unauthenticated Magento XXE
URL:https://github.com/th3gokul/CVE-2024-34102
标签:#CVE-2024
GitHub
GitHub - th3gokul/CVE-2024-34102: CVE-2024-34102: Unauthenticated Magento XXE
CVE-2024-34102: Unauthenticated Magento XXE. Contribute to th3gokul/CVE-2024-34102 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.
URL:https://github.com/bigb0x/CVE-2024-34102
标签:#CVE-2024
更新了:CVE-2024
描述:POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.
URL:https://github.com/bigb0x/CVE-2024-34102
标签:#CVE-2024
GitHub
GitHub - bigb0x/CVE-2024-34102: POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.
POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce. - GitHub - bigb0x/CVE-2024-34102: POC for CVE-2024-34102. A pre-authentication XML entity injec...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/dr3u1d/CVE-2024-34102-RCE
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/dr3u1d/CVE-2024-34102-RCE
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:绕过
描述:网易我的世界发烧平台绕过
URL:https://github.com/daijunhaoMinecraft/WPFLauncher_fever_Bypass
标签:#绕过
更新了:绕过
描述:网易我的世界发烧平台绕过
URL:https://github.com/daijunhaoMinecraft/WPFLauncher_fever_Bypass
标签:#绕过
GitHub
GitHub - daijunhaoMinecraft/WPFLauncher_fever_Bypass: 网易我的世界发烧平台绕过
网易我的世界发烧平台绕过. Contribute to daijunhaoMinecraft/WPFLauncher_fever_Bypass development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:渗透测试
描述:红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。
URL:https://github.com/Maikefee/BurpAutoProxySwitcherPlugins_Maikefee
标签:#渗透测试
更新了:渗透测试
描述:红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。
URL:https://github.com/Maikefee/BurpAutoProxySwitcherPlugins_Maikefee
标签:#渗透测试
GitHub
GitHub - Maikefee/BurpAutoProxySwitcherPlugins_Maikefee: 红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。
红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。 - Maikefee/BurpAutoProxySwitcherPlugins_Maikefee
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4577
URL:https://github.com/olebris/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4577
URL:https://github.com/olebris/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - olebris/CVE-2024-4577: CVE-2024-4577
CVE-2024-4577. Contribute to olebris/CVE-2024-4577 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-21413 PoC
URL:https://github.com/olebris/CVE-2024-21413
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-21413 PoC
URL:https://github.com/olebris/CVE-2024-21413
标签:#CVE-2024
GitHub
GitHub - olebris/CVE-2024-21413: CVE-2024-21413 PoC
CVE-2024-21413 PoC. Contribute to olebris/CVE-2024-21413 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内存马
描述:基于Agent技术实现的Java内存马查杀、防护工具。
URL:https://github.com/suizhibo/MemShellKiller
标签:#内存马
更新了:内存马
描述:基于Agent技术实现的Java内存马查杀、防护工具。
URL:https://github.com/suizhibo/MemShellKiller
标签:#内存马
GitHub
GitHub - suizhibo/MemShellKiller: 基于Agent技术实现的Java内存马查杀、防护工具。
基于Agent技术实现的Java内存马查杀、防护工具。. Contribute to suizhibo/MemShellKiller development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:自研的利用JavaFX技术编写的针对于Thinkphp框架的图形化漏洞扫描工具,漏洞包括多版本的命令执行和日志泄露
URL:https://github.com/XiLitter/Tp_Attack_GUI
标签:#漏洞利用
更新了:漏洞利用
描述:自研的利用JavaFX技术编写的针对于Thinkphp框架的图形化漏洞扫描工具,漏洞包括多版本的命令执行和日志泄露
URL:https://github.com/XiLitter/Tp_Attack_GUI
标签:#漏洞利用
GitHub
GitHub - XiLitter/Tp_Attack_GUI: 自研的利用JavaFX技术编写的针对于Thinkphp框架的图形化漏洞扫描工具,漏洞包括多版本的命令执行和日志泄露
自研的利用JavaFX技术编写的针对于Thinkphp框架的图形化漏洞扫描工具,漏洞包括多版本的命令执行和日志泄露 - XiLitter/Tp_Attack_GUI
GitHub监控消息提醒!!!
更新了:webshell
描述:Ini adalah kumpulan webshell atau backdoor yang lengkap
URL:https://github.com/alarcidk/Webshellbackdoor
标签:#webshell
更新了:webshell
描述:Ini adalah kumpulan webshell atau backdoor yang lengkap
URL:https://github.com/alarcidk/Webshellbackdoor
标签:#webshell
GitHub
GitHub - alarcidk/Webshellbackdoor: Ini adalah kumpulan webshell atau backdoor yang lengkap
Ini adalah kumpulan webshell atau backdoor yang lengkap - GitHub - alarcidk/Webshellbackdoor: Ini adalah kumpulan webshell atau backdoor yang lengkap
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:An open source tool focused on software supply chain security. 墨菲安全专注于软件供应链安全,具备专业的软件成分分析(SCA)、漏洞检测、专业漏洞库。
URL:https://github.com/laj9/threat_perception_platform
标签:#漏洞检测
更新了:漏洞检测
描述:An open source tool focused on software supply chain security. 墨菲安全专注于软件供应链安全,具备专业的软件成分分析(SCA)、漏洞检测、专业漏洞库。
URL:https://github.com/laj9/threat_perception_platform
标签:#漏洞检测
GitHub
GitHub - laj9/threat_perception_platform: 1. 开发了一个具备威胁感知功能的应用程序。 2. 使用Spring和SpringBoot框架开发具有威胁感知功能的应用程序,并配置MyBatis和MySQL进行CRUD操作。…
1. 开发了一个具备威胁感知功能的应用程序。 2. 使用Spring和SpringBoot框架开发具有威胁感知功能的应用程序,并配置MyBatis和MySQL进行CRUD操作。 3. 引入并配置Redis,使用Python和Java操作RabbitMQ,并实现消息队列功能。 4. 实现对使用本产品的主机进行资产管理(账号资产/服务资产/进程资产/软件资产)、风险发现(安全补丁/漏洞检测/弱密...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Mass Exploit - CVE-2024-21650 - XWiki < Remote code execution (RCE)
URL:https://github.com/codeb0ss/CVE-2024-21650-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Mass Exploit - CVE-2024-21650 - XWiki < Remote code execution (RCE)
URL:https://github.com/codeb0ss/CVE-2024-21650-PoC
标签:#CVE-2024
GitHub
GitHub - codeb0ss/CVE-2024-21650-PoC: Mass Exploit - CVE-2024-21650 - XWiki < Remote code execution (RCE)
Mass Exploit - CVE-2024-21650 - XWiki < Remote code execution (RCE) - codeb0ss/CVE-2024-21650-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:Modified RCE with a remote shell and logging
URL:https://github.com/glen-pearson/CVE-2023-34362-RCE
标签:#RCE
更新了:RCE
描述:Modified RCE with a remote shell and logging
URL:https://github.com/glen-pearson/CVE-2023-34362-RCE
标签:#RCE
GitHub
GitHub - glen-pearson/MoveIT-CVE-2023-34362-RCE: Modified RCE with a remote shell and logging
Modified RCE with a remote shell and logging. Contribute to glen-pearson/MoveIT-CVE-2023-34362-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Modified RCE with a remote shell and logging
URL:https://github.com/omershaik0/Gila-CMS-1.10.9-RCE-Authenticated
标签:#RCE
更新了:RCE
描述:Modified RCE with a remote shell and logging
URL:https://github.com/omershaik0/Gila-CMS-1.10.9-RCE-Authenticated
标签:#RCE
GitHub
GitHub - omershaik0/Gila-CMS-1.10.9-RCE-Authenticated: This Python script exploits the Gila CMS 1.10.9 vulnerability to achieve…
This Python script exploits the Gila CMS 1.10.9 vulnerability to achieve authenticated remote code execution (RCE). It uploads a shell, allowing arbitrary command execution on the target system. Th...
GitHub监控消息提醒!!!
更新了:RCE
描述:Modified RCE with a remote shell and logging
URL:https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE
标签:#RCE
更新了:RCE
描述:Modified RCE with a remote shell and logging
URL:https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE
标签:#RCE
GitHub
GitHub - glen-pearson/MoveIT-CVE-2023-34362-RCE: Modified RCE with a remote shell and logging
Modified RCE with a remote shell and logging. Contribute to glen-pearson/MoveIT-CVE-2023-34362-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CosmicSting (CVE-2024-34102)
URL:https://github.com/Chocapikk/CVE-2024-34102
标签:#CVE-2024
更新了:CVE-2024
描述:CosmicSting (CVE-2024-34102)
URL:https://github.com/Chocapikk/CVE-2024-34102
标签:#CVE-2024
GitHub
GitHub - Chocapikk/CVE-2024-34102: CosmicSting (CVE-2024-34102)
CosmicSting (CVE-2024-34102). Contribute to Chocapikk/CVE-2024-34102 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:TEST CVE-2024-34102 Magento XXE
URL:https://github.com/cmsec423/CVE-2024-34102
标签:#CVE-2024
更新了:CVE-2024
描述:TEST CVE-2024-34102 Magento XXE
URL:https://github.com/cmsec423/CVE-2024-34102
标签:#CVE-2024
GitHub
cmsec423/CVE-2024-34102
Magento XXE. Contribute to cmsec423/CVE-2024-34102 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:ROP chain to get RCE 0day of Tenda Modem Ac8v4
URL:https://github.com/NextGenPentesters/0day-RCE-for-Tenda-Modem-
标签:#RCE
更新了:RCE
描述:ROP chain to get RCE 0day of Tenda Modem Ac8v4
URL:https://github.com/NextGenPentesters/0day-RCE-for-Tenda-Modem-
标签:#RCE
GitHub
GitHub - NextGenPentesters/0day-RCE-for-Tenda-Modem-: ROP chain to get RCE 0day of Tenda Modem Ac8v4
ROP chain to get RCE 0day of Tenda Modem Ac8v4. Contribute to NextGenPentesters/0day-RCE-for-Tenda-Modem- development by creating an account on GitHub.