GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Arbitrary file read vulnerability through the CLI can lead to RCE
URL:https://github.com/viszsec/CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:Arbitrary file read vulnerability through the CLI can lead to RCE
URL:https://github.com/viszsec/CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - viszsec/CVE-2024-23897: Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE
Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE - viszsec/CVE-2024-23897
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:Struts2全版本漏洞检测工具 by:ABC_123
URL:https://github.com/abc123info/Struts2VulsScanTools
标签:#漏洞检测
更新了:漏洞检测
描述:Struts2全版本漏洞检测工具 by:ABC_123
URL:https://github.com/abc123info/Struts2VulsScanTools
标签:#漏洞检测
GitHub
GitHub - abc123info/Struts2VulsScanTools: 1、点击“检测漏洞”,会自动检测该URL是否存在S2-001、S2-005、S2-009、S2-013、S2-016、S2-019、S2-020/021、S2-032、S2…
1、点击“检测漏洞”,会自动检测该URL是否存在S2-001、S2-005、S2-009、S2-013、S2-016、S2-019、S2-020/021、S2-032、S2-037、DevMode、S2-045/046、S2-052、S2-048、S2-053、S2-057、S2-061、S2相关log4j2十余种漏洞。 2、“批量验证”,(为防止批量geshell,此功能已经删除,并不再...
GitHub监控消息提醒!!!
更新了:权限提升
描述:Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
URL:https://github.com/coldpon/elevationTool
标签:#权限提升
更新了:权限提升
描述:Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
URL:https://github.com/coldpon/elevationTool
标签:#权限提升
GitHub
GitHub - coldpon/elevationTool: Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller
Elevate process privileges to the System or Trustedinstaller,将进程权限提升到 System 或 Trustedinstaller - coldpon/elevationTool
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic Shell Uploader Used phpunit() Remote Code Executions (RCE)
URL:https://github.com/imhunterand/phpunitRCE
标签:#RCE
更新了:RCE
描述:Automatic Shell Uploader Used phpunit() Remote Code Executions (RCE)
URL:https://github.com/imhunterand/phpunitRCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Out Of Band Server for blind RCE vulnerability
URL:https://github.com/NinjaGPT/oob_server
标签:#RCE
更新了:RCE
描述:Out Of Band Server for blind RCE vulnerability
URL:https://github.com/NinjaGPT/oob_server
标签:#RCE
GitHub
GitHub - NinjaGPT/oob_server: Out Of Band Server for blind RCE vulnerability
Out Of Band Server for blind RCE vulnerability. Contribute to NinjaGPT/oob_server development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞复现
描述:JAVA 安全靶场,IAST 测试用例,JAVA漏洞复现
URL:https://github.com/lokerxx/JavaVul
标签:#漏洞复现
更新了:漏洞复现
描述:JAVA 安全靶场,IAST 测试用例,JAVA漏洞复现
URL:https://github.com/lokerxx/JavaVul
标签:#漏洞复现
GitHub
GitHub - lokerxx/JavaVul: JAVA 安全靶场,IAST 测试用例,JAVA漏洞复现,代码审计,SAST测试用例,安全扫描(主动和被动),JAVA漏洞靶场,RASP测试用例 ; Java Security Testbed, IAST…
JAVA 安全靶场,IAST 测试用例,JAVA漏洞复现,代码审计,SAST测试用例,安全扫描(主动和被动),JAVA漏洞靶场,RASP测试用例 ; Java Security Testbed, IAST Test Cases, Java Vulnerability Reproduction, Code Auditing, SAST Test Cases, Security Scanni...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-0402 Gitlab arbitrary file write/RCE
URL:https://github.com/ch4nui/CVE-2024-0402-RCE
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-0402 Gitlab arbitrary file write/RCE
URL:https://github.com/ch4nui/CVE-2024-0402-RCE
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for CVE-2024-23897
URL:https://github.com/AbraXa5/Jenkins-CVE-2024-23897
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for CVE-2024-23897
URL:https://github.com/AbraXa5/Jenkins-CVE-2024-23897
标签:#CVE-2024
GitHub
GitHub - AbraXa5/Jenkins-CVE-2024-23897: PoC for Jenkins CVE-2024-23897
PoC for Jenkins CVE-2024-23897. Contribute to AbraXa5/Jenkins-CVE-2024-23897 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatically enumerate RCE methods, key system files, and webroot files with LFI vulnerabilities.
URL:https://github.com/Jake123otte1/LFInder
标签:#RCE
更新了:RCE
描述:Automatically enumerate RCE methods, key system files, and webroot files with LFI vulnerabilities.
URL:https://github.com/Jake123otte1/LFInder
标签:#RCE
GitHub
GitHub - Jake123otte1/Includer: Automatically enumerate RCE methods, key system files, and webroot files with LFI vulnerabilities.
Automatically enumerate RCE methods, key system files, and webroot files with LFI vulnerabilities. - Jake123otte1/Includer
GitHub监控消息提醒!!!
更新了:绕过
描述:一个通过绕过 Cloudflare 防御代理实现微信扫码 / 公众号登录即可体验 ChatGPT 的服务
URL:https://github.com/FakeOpenAI/FakeOpenAI
标签:#绕过
更新了:绕过
描述:一个通过绕过 Cloudflare 防御代理实现微信扫码 / 公众号登录即可体验 ChatGPT 的服务
URL:https://github.com/FakeOpenAI/FakeOpenAI
标签:#绕过
GitHub
GitHub - FakeOAI/FakeOAI
Contribute to FakeOAI/FakeOAI development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:go-jeans是一个快速的序列化、反序列化库,是出于替代手动封装数据结构带来的繁琐问题,其性能远超当下主流的编码格式
URL:https://github.com/Li-giegie/go-jeans
标签:#反序列化
更新了:反序列化
描述:go-jeans是一个快速的序列化、反序列化库,是出于替代手动封装数据结构带来的繁琐问题,其性能远超当下主流的编码格式
URL:https://github.com/Li-giegie/go-jeans
标签:#反序列化
GitHub
GitHub - Li-giegie/go-jeans: go-jeans是一个高效的数据序列化与反序列化库,解决手动封装数据结构所带来的繁琐问题,通过将数据结构快速编码为二进制格式,比主流编码格式更优越的性能表现,使得数据的传输和存储更加高效可靠。
go-jeans是一个高效的数据序列化与反序列化库,解决手动封装数据结构所带来的繁琐问题,通过将数据结构快速编码为二进制格式,比主流编码格式更优越的性能表现,使得数据的传输和存储更加高效可靠。 - Li-giegie/go-jeans
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:CVE-2018-7600 漏洞验证和利用
URL:https://github.com/killeveee/CVE-2018-7600
标签:#漏洞利用
更新了:漏洞利用
描述:CVE-2018-7600 漏洞验证和利用
URL:https://github.com/killeveee/CVE-2018-7600
标签:#漏洞利用
GitHub
GitHub - killeveee/CVE-2018-7600: CVE-2018-7600 漏洞验证和利用
CVE-2018-7600 漏洞验证和利用. Contribute to killeveee/CVE-2018-7600 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatically enumerate RCE methods, key system files, and webroot files with LFI vulnerabilities.
URL:https://github.com/Jake123otte1/Includer
标签:#RCE
更新了:RCE
描述:Automatically enumerate RCE methods, key system files, and webroot files with LFI vulnerabilities.
URL:https://github.com/Jake123otte1/Includer
标签:#RCE
GitHub
GitHub - 2ptr/Includer: Automatically enumerate RCE methods, key system files, and webroot files with LFI vulnerabilities.
Automatically enumerate RCE methods, key system files, and webroot files with LFI vulnerabilities. - 2ptr/Includer
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC and Detection for CVE-2024-21626
URL:https://github.com/NitroCao/CVE-2024-21626
标签:#CVE-2024
更新了:CVE-2024
描述:PoC and Detection for CVE-2024-21626
URL:https://github.com/NitroCao/CVE-2024-21626
标签:#CVE-2024
GitHub
GitHub - NitroCao/CVE-2024-21626: PoC and Detection for CVE-2024-21626
PoC and Detection for CVE-2024-21626. Contribute to NitroCao/CVE-2024-21626 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC and Detection for CVE-2024-21626
URL:https://github.com/White-Hat-HackerX/CVE-2024-0652
标签:#CVE-2024
更新了:CVE-2024
描述:PoC and Detection for CVE-2024-21626
URL:https://github.com/White-Hat-HackerX/CVE-2024-0652
标签:#CVE-2024
GitHub
GitHub - White-Hat-HackerX/CVE-2024-0652: A vulnerability was found in PHPgurukul visitor management system 1.0. it has been rated…
A vulnerability was found in PHPgurukul visitor management system 1.0. it has been rated as problemic. Affected by the issue is some unknown functionality of the file search bar that called search-...
GitHub监控消息提醒!!!
更新了:RCE
描述:BACKUP-MIGRATION RCE EXPLOIT
URL:https://github.com/venomsploit/wpexploit0day2-backupmig-
标签:#RCE
更新了:RCE
描述:BACKUP-MIGRATION RCE EXPLOIT
URL:https://github.com/venomsploit/wpexploit0day2-backupmig-
标签:#RCE
GitHub
GitHub - venomsploit/wpexploit0day2-backupmig-: BACKUP-MIGRATION RCE EXPLOIT
BACKUP-MIGRATION RCE EXPLOIT. Contribute to venomsploit/wpexploit0day2-backupmig- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:The Poc for CVE-2024-20931
URL:https://github.com/GlassyAmadeus/CVE-2024-20931
标签:#CVE-2024
更新了:CVE-2024
描述:The Poc for CVE-2024-20931
URL:https://github.com/GlassyAmadeus/CVE-2024-20931
标签:#CVE-2024
GitHub
GitHub - GlassyAmadeus/CVE-2024-20931: The Poc for CVE-2024-20931
The Poc for CVE-2024-20931. Contribute to GlassyAmadeus/CVE-2024-20931 development by creating an account on GitHub.