GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Useful Cobalt Strike techniques learned from engagements
URL:https://github.com/wsummerhill/C2_RedTeam_CheatSheets
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Useful Cobalt Strike techniques learned from engagements
URL:https://github.com/wsummerhill/C2_RedTeam_CheatSheets
标签:#Cobalt Strike
GitHub
GitHub - wsummerhill/C2_RedTeam_CheatSheets: Useful C2 techniques and cheat sheets learned from engagements
Useful C2 techniques and cheat sheets learned from engagements - wsummerhill/C2_RedTeam_CheatSheets
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:PoC of CVE-2023-42793
URL:https://github.com/Zenmovie/CVE-2023-42793
标签:#CVE-2023
更新了:CVE-2023
描述:PoC of CVE-2023-42793
URL:https://github.com/Zenmovie/CVE-2023-42793
标签:#CVE-2023
GitHub
GitHub - Zenmovie/CVE-2023-42793: PoC of CVE-2023-42793
PoC of CVE-2023-42793. Contribute to Zenmovie/CVE-2023-42793 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:Red Team
描述:A set of Ansible scripts that can be used for Incident Response competitions by the Red Team to create low-hanging fruit for the blueteam to find.
URL:https://github.com/ads3853/TrainingWheelsProtocol
标签:#Red Team
更新了:Red Team
描述:A set of Ansible scripts that can be used for Incident Response competitions by the Red Team to create low-hanging fruit for the blueteam to find.
URL:https://github.com/ads3853/TrainingWheelsProtocol
标签:#Red Team
GitHub
GitHub - ads3853/TrainingWheelsProtocol: A set of Ansible scripts that can be used for Incident Response competitions by the Red…
A set of Ansible scripts that can be used for Incident Response competitions by the Red Team to create low-hanging fruit for the Blue Team to find (and Red Team to exploit) - ads3853/TrainingWheels...
GitHub监控消息提醒!!!
更新了:RCE
描述:Visual Studio RCE using PreBuildEvent tag on .csproj file
URL:https://github.com/fantasy0x1/csproj-rce
标签:#RCE
更新了:RCE
描述:Visual Studio RCE using PreBuildEvent tag on .csproj file
URL:https://github.com/fantasy0x1/csproj-rce
标签:#RCE
GitHub
GitHub - exorcize/csproj-rce: Visual Studio RCE using PreBuild target on .csproj file
Visual Studio RCE using PreBuild target on .csproj file - exorcize/csproj-rce
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Mass check CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)
URL:https://github.com/zaenhaxor/CVE-2023-41892
标签:#CVE-2023
更新了:CVE-2023
描述:Mass check CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)
URL:https://github.com/zaenhaxor/CVE-2023-41892
标签:#CVE-2023
GitHub
GitHub - zaenhaxor/CVE-2023-41892: CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)
CVE-2023-41892 - Craft CMS Remote Code Execution (RCE) - zaenhaxor/CVE-2023-41892
GitHub监控消息提醒!!!
更新了:RCE
描述:Mass check CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)
URL:https://github.com/rajat4722/Bug-Bounty-Hacktoberfest-2023
标签:#RCE
更新了:RCE
描述:Mass check CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)
URL:https://github.com/rajat4722/Bug-Bounty-Hacktoberfest-2023
标签:#RCE
GitHub
GitHub - rajat4722/Stuff-Bug-Bounty: This repository contains a collection of cheat sheets for bug bounty hunters. These cheat…
This repository contains a collection of cheat sheets for bug bounty hunters. These cheat sheets cover a variety of topics, including SQL injection, XSS, SSRF, RCE, open redirect, command injection...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Mass exploit - CVE-2023-38501 - Copyparty < Cross-Site Scripting [XSS]
URL:https://github.com/codeb0ss/CVE-2023-38501-Exploit
标签:#CVE-2023
更新了:CVE-2023
描述:Mass exploit - CVE-2023-38501 - Copyparty < Cross-Site Scripting [XSS]
URL:https://github.com/codeb0ss/CVE-2023-38501-Exploit
标签:#CVE-2023
GitHub
GitHub - codeb0ss/CVE-2023-38501-Exploit: Mass exploit - CVE-2023-38501 - Copyparty < Cross-Site Scripting [XSS]
Mass exploit - CVE-2023-38501 - Copyparty < Cross-Site Scripting [XSS] - codeb0ss/CVE-2023-38501-Exploit
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:爬取智能合约结合深度学习技术对其进行重入漏洞检测,同时分析其上下文对其进行字节码重写修复
URL:https://github.com/eliQAQ/detect-vulnerable-contract
标签:#漏洞检测
更新了:漏洞检测
描述:爬取智能合约结合深度学习技术对其进行重入漏洞检测,同时分析其上下文对其进行字节码重写修复
URL:https://github.com/eliQAQ/detect-vulnerable-contract
标签:#漏洞检测
GitHub
GitHub - eliQAQ/detect-vulnerable-contract: 爬取智能合约结合深度学习技术对其进行重入漏洞检测,同时分析其上下文对其进行字节码重写修复
爬取智能合约结合深度学习技术对其进行重入漏洞检测,同时分析其上下文对其进行字节码重写修复. Contribute to eliQAQ/detect-vulnerable-contract development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Simple demo of a Remote Code Execution (RCE) Vulnerability in Node.js and how using distroless prevents it.
URL:https://github.com/mwager/nodejs_exploit
标签:#RCE
更新了:RCE
描述:Simple demo of a Remote Code Execution (RCE) Vulnerability in Node.js and how using distroless prevents it.
URL:https://github.com/mwager/nodejs_exploit
标签:#RCE
GitHub
GitHub - mwager/nodejs_exploit: Simple demo of a Remote Code Execution (RCE) Vulnerability in Node.js and how using distroless…
Simple demo of a Remote Code Execution (RCE) Vulnerability in Node.js and how using distroless prevents it. - GitHub - mwager/nodejs_exploit: Simple demo of a Remote Code Execution (RCE) Vulnerabi...
GitHub监控消息提醒!!!
更新了:横向移动
描述:Lateral movement tools by abusing port 135(135端口横向移动工具)
URL:https://github.com/wqreytuk/py135
标签:#横向移动
更新了:横向移动
描述:Lateral movement tools by abusing port 135(135端口横向移动工具)
URL:https://github.com/wqreytuk/py135
标签:#横向移动
GitHub监控消息提醒!!!
更新了:渗透测试
描述:SBSCAN是一款针对spring框架的渗透测试工具,可以对指定站点进行spring boot敏感信息扫描以及进行spring漏洞扫描与验证。
URL:https://github.com/sule01u/SBSCAN
标签:#渗透测试
更新了:渗透测试
描述:SBSCAN是一款针对spring框架的渗透测试工具,可以对指定站点进行spring boot敏感信息扫描以及进行spring漏洞扫描与验证。
URL:https://github.com/sule01u/SBSCAN
标签:#渗透测试
GitHub
GitHub - WuliRuler/SBSCAN: 🎭 SBSCAN是一款专注于spring框架的渗透测试工具,可以对指定站点进行springboot未授权扫描/敏感信息扫描以及进行spring框架漏洞扫描与验证的综合利用工具。 [SBSCAN…
🎭 SBSCAN是一款专注于spring框架的渗透测试工具,可以对指定站点进行springboot未授权扫描/敏感信息扫描以及进行spring框架漏洞扫描与验证的综合利用工具。 [SBSCAN is a penetration testing tool focused on the spring framework that can scan springboot sensitiv...
GitHub监控消息提醒!!!
更新了:RCE
描述:A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)
URL:https://github.com/themmokhtar/CVE-2020-0022
标签:#RCE
更新了:RCE
描述:A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)
URL:https://github.com/themmokhtar/CVE-2020-0022
标签:#RCE
GitHub
GitHub - themmokhtar/CVE-2020-0022: A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel…
A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL) - themmokhtar/CVE-2020-0022
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence
URL:https://github.com/ErikWynter/CVE-2023-22515-Scan
标签:#CVE-2023
更新了:CVE-2023
描述:Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence
URL:https://github.com/ErikWynter/CVE-2023-22515-Scan
标签:#CVE-2023
GitHub
GitHub - ErikWynter/CVE-2023-22515-Scan: Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence
Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence - ErikWynter/CVE-2023-22515-Scan
GitHub监控消息提醒!!!
更新了:Red Team
描述:RTO Exam notes and tools, get your Red Team Operations by Zero-Point Security.
URL:https://github.com/Certs-Study/CRTO-Certified-Red-Team-Operator
标签:#Red Team
更新了:Red Team
描述:RTO Exam notes and tools, get your Red Team Operations by Zero-Point Security.
URL:https://github.com/Certs-Study/CRTO-Certified-Red-Team-Operator
标签:#Red Team
GitHub
GitHub - Certs-Study/CRTO-Certified-Red-Team-Operator: RTO Exam notes and tools, get your Red Team Operations by Zero-Point Security.
RTO Exam notes and tools, get your Red Team Operations by Zero-Point Security. - GitHub - Certs-Study/CRTO-Certified-Red-Team-Operator: RTO Exam notes and tools, get your Red Team Operations by Zer...
GitHub监控消息提醒!!!
更新了:攻防
描述:面向大语言模型的提示注入攻防竞赛参赛总结
URL:https://github.com/pengwork/2023-prompt-inject-contest
标签:#攻防
更新了:攻防
描述:面向大语言模型的提示注入攻防竞赛参赛总结
URL:https://github.com/pengwork/2023-prompt-inject-contest
标签:#攻防
GitHub
GitHub - pengwork/2023-prompt-inject-contest: 面向大语言模型的提示注入攻防竞赛参赛总结
面向大语言模型的提示注入攻防竞赛参赛总结. Contribute to pengwork/2023-prompt-inject-contest development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:这是一款在发生应急响应事件时可以快速对Windows和Linux系统的证据链进行收集的工具
URL:https://github.com/topmrmt/Emergency
标签:#应急响应
更新了:应急响应
描述:这是一款在发生应急响应事件时可以快速对Windows和Linux系统的证据链进行收集的工具
URL:https://github.com/topmrmt/Emergency
标签:#应急响应
GitHub
GitHub - topmrmt/Emergency: 这是一款在发生应急响应事件时可以快速对Windows和Linux系统的证据链进行收集的工具
这是一款在发生应急响应事件时可以快速对Windows和Linux系统的证据链进行收集的工具. Contribute to topmrmt/Emergency development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:pathScan 是一个用Go编写的路径扫描、信息收集、指纹探索工具
URL:https://github.com/wjlin0/pathScan
标签:#信息收集
更新了:信息收集
描述:pathScan 是一个用Go编写的路径扫描、信息收集、指纹探索工具
URL:https://github.com/wjlin0/pathScan
标签:#信息收集
GitHub
GitHub - wjlin0/pathScan: pathScan 是一个用Go编写的路径扫描、信息收集、指纹探索工具
pathScan 是一个用Go编写的路径扫描、信息收集、指纹探索工具. Contribute to wjlin0/pathScan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:用于解密并加载shellcode,支持RC4和AES两种解密方法,并使用DInvoke来动态调用WinAPI函数,从而尝试绕过某些安全解决方案
URL:https://github.com/xf555er/SharpShellcodeLoader_Rc4Aes
标签:#绕过
更新了:绕过
描述:用于解密并加载shellcode,支持RC4和AES两种解密方法,并使用DInvoke来动态调用WinAPI函数,从而尝试绕过某些安全解决方案
URL:https://github.com/xf555er/SharpShellcodeLoader_Rc4Aes
标签:#绕过
GitHub
GitHub - xf555er/SharpShellcodeLoader_Rc4Aes: 用于解密并加载shellcode,支持RC4和AES两种解密方法,并使用DInvoke来动态调用WinAPI函数,从而尝试绕过某些安全解决方案
用于解密并加载shellcode,支持RC4和AES两种解密方法,并使用DInvoke来动态调用WinAPI函数,从而尝试绕过某些安全解决方案 - xf555er/SharpShellcodeLoader_Rc4Aes