GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527
URL:https://github.com/dnkhack/fixcve2023_39526_2023_39527
标签:#CVE-2023
更新了:CVE-2023
描述:Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527
URL:https://github.com/dnkhack/fixcve2023_39526_2023_39527
标签:#CVE-2023
GitHub
GitHub - dnkhack/fixcve2023_39526_2023_39527: Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527
Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527 - GitHub - dnkhack/fixcve2023_39526_2023_39527: Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527
GitHub监控消息提醒!!!
更新了:Red Team
描述:Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
URL:https://github.com/KCarretto/realm
标签:#Red Team
更新了:Red Team
描述:Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
URL:https://github.com/KCarretto/realm
标签:#Red Team
GitHub
GitHub - spellshift/realm: Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability. - spellshift/realm
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:This tool is built in golang language to exploit CVE-2023-35078 vulnerability inspired by similar tool in python language https://github.com/vchan-in/CVE-2023-35078-Exploit-POC
URL:https://github.com/LazyySec/CVE-2023-35078
标签:#CVE-2023
更新了:CVE-2023
描述:This tool is built in golang language to exploit CVE-2023-35078 vulnerability inspired by similar tool in python language https://github.com/vchan-in/CVE-2023-35078-Exploit-POC
URL:https://github.com/LazyySec/CVE-2023-35078
标签:#CVE-2023
GitHub
GitHub - vchan-in/CVE-2023-35078-Exploit-POC: CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC
CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC - vchan-in/CVE-2023-35078-Exploit-POC
GitHub监控消息提醒!!!
更新了:Red Team
描述:DefCon Red Team Village 2023 Workshop on DLL Sideloading
URL:https://github.com/mwnickerson/RedTeamVillage2023-DLL-Sideloading
标签:#Red Team
更新了:Red Team
描述:DefCon Red Team Village 2023 Workshop on DLL Sideloading
URL:https://github.com/mwnickerson/RedTeamVillage2023-DLL-Sideloading
标签:#Red Team
GitHub
GitHub - mwnickerson/RedTeamVillage2023-DLL-Sideloading: DefCon Red Team Village 2023 Workshop on DLL Sideloading
DefCon Red Team Village 2023 Workshop on DLL Sideloading - mwnickerson/RedTeamVillage2023-DLL-Sideloading
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-4174 PoC
URL:https://github.com/d0rb/CVE-2023-4174
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-4174 PoC
URL:https://github.com/d0rb/CVE-2023-4174
标签:#CVE-2023
GitHub
GitHub - d0rb/CVE-2023-4174: CVE-2023-4174 PoC
CVE-2023-4174 PoC. Contribute to d0rb/CVE-2023-4174 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:使用 Termux 执行这个脚本来安装资源包以绕过登录对话框
URL:https://github.com/Webpage-gh/Bypass-MC-Education-Edition-login
标签:#绕过
更新了:绕过
描述:使用 Termux 执行这个脚本来安装资源包以绕过登录对话框
URL:https://github.com/Webpage-gh/Bypass-MC-Education-Edition-login
标签:#绕过
GitHub监控消息提醒!!!
更新了:webshell
描述:Membersihkan folder yang sudah kena webshell [403WebShell](https://github.com/yon3zu/403WebShell/tree/main) atau sejenisnya.
URL:https://github.com/3vluzi/Hapus-File-dan-Folder-Webshell
标签:#webshell
更新了:webshell
描述:Membersihkan folder yang sudah kena webshell [403WebShell](https://github.com/yon3zu/403WebShell/tree/main) atau sejenisnya.
URL:https://github.com/3vluzi/Hapus-File-dan-Folder-Webshell
标签:#webshell
GitHub
GitHub - yon3zu/403WebShell: 99% Bypassed Litespeed Server / 403 Forbidden
99% Bypassed Litespeed Server / 403 Forbidden. Contribute to yon3zu/403WebShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-36899 PoC
URL:https://github.com/d0rb/CVE-2023-36899
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-36899 PoC
URL:https://github.com/d0rb/CVE-2023-36899
标签:#CVE-2023
GitHub
GitHub - d0rb/CVE-2023-36899: CVE-2023-36899 PoC
CVE-2023-36899 PoC. Contribute to d0rb/CVE-2023-36899 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Check for CVE-2023-32629 \"GameOver(lay)\" vulnerability
URL:https://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay
标签:#CVE-2023
更新了:CVE-2023
描述:Check for CVE-2023-32629 \"GameOver(lay)\" vulnerability
URL:https://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay
标签:#CVE-2023
GitHub
GitHub - kaotickj/Check-for-CVE-2023-32629-GameOver-lay: Check for CVE-2023-32629 "GameOver(lay)" vulnerability
Check for CVE-2023-32629 "GameOver(lay)" vulnerability - GitHub - kaotickj/Check-for-CVE-2023-32629-GameOver-lay: Check for CVE-2023-32629 "GameOver(lay)" vulnerability
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI agent for Red Team
URL:https://github.com/niwasmala/red-agent
标签:#Red Team
更新了:Red Team
描述:AI agent for Red Team
URL:https://github.com/niwasmala/red-agent
标签:#Red Team
GitHub
GitHub - niwasmala/redagent: AI agent for Red Team
AI agent for Red Team. Contribute to niwasmala/redagent development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike is a dark blue inspired theme for Standard Notes
URL:https://github.com/m00t316/cobalt-strike
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike is a dark blue inspired theme for Standard Notes
URL:https://github.com/m00t316/cobalt-strike
标签:#Cobalt Strike
❤1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name.
URL:https://github.com/dhmosfunk/HTTP3ONSTEROIDS
标签:#CVE-2023
更新了:CVE-2023
描述:HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name.
URL:https://github.com/dhmosfunk/HTTP3ONSTEROIDS
标签:#CVE-2023
GitHub
GitHub - dhmosfunk/HTTP3ONSTEROIDS: HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails…
HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name. - dhmosfunk/HTTP3ONSTEROIDS
GitHub监控消息提醒!!!
更新了:Red Team
描述:Tool to easily install Kali Linux tools on Ubuntu to make it a distro suitable for a Red Team
URL:https://github.com/Sfrisio/redbuntu
标签:#Red Team
更新了:Red Team
描述:Tool to easily install Kali Linux tools on Ubuntu to make it a distro suitable for a Red Team
URL:https://github.com/Sfrisio/redbuntu
标签:#Red Team
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Resources ⚔️ 🛡 🥷🏼
URL:https://github.com/pwnatic/Red-Teaming-101
标签:#Red Team
更新了:Red Team
描述:Red Teaming Resources ⚔️ 🛡 🥷🏼
URL:https://github.com/pwnatic/Red-Teaming-101
标签:#Red Team
GitHub
pwnatic/Red-Teaming-101
Red Teaming Resources ⚔️ 🛡 🥷🏼. Contribute to pwnatic/Red-Teaming-101 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:免杀
描述:Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。
URL:https://github.com/ZackSecurity/Phobos
标签:#免杀
更新了:免杀
描述:Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。
URL:https://github.com/ZackSecurity/Phobos
标签:#免杀
GitHub
GitHub - ZackSecurity/Phobos: Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。
Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。 - ZackSecurity/Phobos
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Ghostscript command injection vulnerability PoC (CVE-2023-36664)
URL:https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection
标签:#CVE-2023
更新了:CVE-2023
描述:Ghostscript command injection vulnerability PoC (CVE-2023-36664)
URL:https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection
标签:#CVE-2023
GitHub
GitHub - jakabakos/CVE-2023-36664-Ghostscript-command-injection: Ghostscript command injection vulnerability PoC (CVE-2023-36664)
Ghostscript command injection vulnerability PoC (CVE-2023-36664) - jakabakos/CVE-2023-36664-Ghostscript-command-injection
👎1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Golang PoC for CVE-2023-27163 Mailtrail Exploit
URL:https://github.com/thomas-osgood/CVE-2023-27163
标签:#CVE-2023
更新了:CVE-2023
描述:Golang PoC for CVE-2023-27163 Mailtrail Exploit
URL:https://github.com/thomas-osgood/CVE-2023-27163
标签:#CVE-2023
GitHub
GitHub - thomas-osgood/CVE-2023-27163: Golang PoC for CVE-2023-27163 Mailtrail Exploit
Golang PoC for CVE-2023-27163 Mailtrail Exploit. Contribute to thomas-osgood/CVE-2023-27163 development by creating an account on GitHub.