GitHub监控消息提醒!!!
更新了:RCE
描述:Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D
URL:https://github.com/LordVileOnX/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-
标签:#RCE
更新了:RCE
描述:Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D
URL:https://github.com/LordVileOnX/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-
标签:#RCE
GitHub监控消息提醒!!!
更新了:漏洞EXP
描述:大华智慧园区综合管理平台 video 任意文件上传漏洞POC&EXP
URL:https://github.com/LaoW1823/POC-EXP
标签:#漏洞EXP
更新了:漏洞EXP
描述:大华智慧园区综合管理平台 video 任意文件上传漏洞POC&EXP
URL:https://github.com/LaoW1823/POC-EXP
标签:#漏洞EXP
GitHub
GitHub - LaoW1823/POC-EXP
Contribute to LaoW1823/POC-EXP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:用于Linux应急响应,快速排查异常用户登录情况和入侵信息排查,准确定位溯源时间线,高效辅助还原攻击链。
URL:https://github.com/enomothem/ChiefInspector
标签:#应急响应
更新了:应急响应
描述:用于Linux应急响应,快速排查异常用户登录情况和入侵信息排查,准确定位溯源时间线,高效辅助还原攻击链。
URL:https://github.com/enomothem/ChiefInspector
标签:#应急响应
GitHub
GitHub - enomothem/Whoamifuck: 用于Linux应急响应,快速排查异常用户登录情况和入侵信息排查,准确定位溯源时间线,高效辅助还原攻击链。
用于Linux应急响应,快速排查异常用户登录情况和入侵信息排查,准确定位溯源时间线,高效辅助还原攻击链。 - enomothem/Whoamifuck
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4577
URL:https://github.com/aaddmin1122345/cve-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4577
URL:https://github.com/aaddmin1122345/cve-2024-4577
标签:#CVE-2024
GitHub
GitHub - aaddmin1122345/cve-2024-4577: CVE-2024-4577
CVE-2024-4577. Contribute to aaddmin1122345/cve-2024-4577 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4577
URL:https://github.com/aaddmin1122345/CVE-2024-4577-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4577
URL:https://github.com/aaddmin1122345/CVE-2024-4577-POC
标签:#CVE-2024
GitHub
GitHub - aaddmin1122345/CVE-2024-4577-POC: CVE-2024-4577
CVE-2024-4577. Contribute to aaddmin1122345/CVE-2024-4577-POC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:蓝队
描述:浏览器数据清除脚本,可以检查浏览器中有没有存储特定网址的密码,然后实行数据的清除,主要是用于攻防演练中蓝队防止钓鱼获取浏览器密码。
URL:https://github.com/Bains-sec/Browser_data_erasure_tool
标签:#蓝队
更新了:蓝队
描述:浏览器数据清除脚本,可以检查浏览器中有没有存储特定网址的密码,然后实行数据的清除,主要是用于攻防演练中蓝队防止钓鱼获取浏览器密码。
URL:https://github.com/Bains-sec/Browser_data_erasure_tool
标签:#蓝队
GitHub
GitHub - Bains-sec/Browser_data_erasure_tool: 浏览器数据清除脚本,可以检查浏览器中有没有存储特定网址的密码,然后实行数据的清除,主要是用于攻防演练中蓝队防止钓鱼获取浏览器密码。
浏览器数据清除脚本,可以检查浏览器中有没有存储特定网址的密码,然后实行数据的清除,主要是用于攻防演练中蓝队防止钓鱼获取浏览器密码。 - Bains-sec/Browser_data_erasure_tool
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Tool for validating / testing CVE-2024-36416
URL:https://github.com/kva55/CVE-2024-36416
标签:#CVE-2024
更新了:CVE-2024
描述:Tool for validating / testing CVE-2024-36416
URL:https://github.com/kva55/CVE-2024-36416
标签:#CVE-2024
GitHub
GitHub - kva55/CVE-2024-36416: Tool for validating / testing CVE-2024-36416
Tool for validating / testing CVE-2024-36416. Contribute to kva55/CVE-2024-36416 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC for CVE-2024-4577 with Shodan integration
URL:https://github.com/d3ck4/Shodan-CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:POC for CVE-2024-4577 with Shodan integration
URL:https://github.com/d3ck4/Shodan-CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - d3ck4/Shodan-CVE-2024-4577: POC for CVE-2024-4577 with Shodan integration
POC for CVE-2024-4577 with Shodan integration. Contribute to d3ck4/Shodan-CVE-2024-4577 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass av
描述:HeavenlyBypassAV免杀工具
URL:https://github.com/vxCrypt0r/Voidgate
标签:#bypass av
更新了:bypass av
描述:HeavenlyBypassAV免杀工具
URL:https://github.com/vxCrypt0r/Voidgate
标签:#bypass av
GitHub
GitHub - vxCrypt0r/Voidgate: A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known…
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。
URL:https://github.com/Maikefee/BurpAutoProxySwitcherPlugins
标签:#渗透测试
更新了:渗透测试
描述:红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。
URL:https://github.com/Maikefee/BurpAutoProxySwitcherPlugins
标签:#渗透测试
GitHub
GitHub - Maikefee/BurpAutoProxySwitcherPlugins_Maikefee: 红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。
红队必备,场景:在爆破批量封ip的情况下,爬取socks5代理在bp进行渗透测试。说明:可设置一个请求换一次socks代理ip,这样就绕过了封ip的情况。 - Maikefee/BurpAutoProxySwitcherPlugins_Maikefee
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:BOF implementations of CVE-2024-26229 for Cobalt Strike and Brute Ratel
URL:https://github.com/Cerbersec/CVE-2024-26229-BOF
标签:#CVE-2024
更新了:CVE-2024
描述:BOF implementations of CVE-2024-26229 for Cobalt Strike and Brute Ratel
URL:https://github.com/Cerbersec/CVE-2024-26229-BOF
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation
URL:https://github.com/truonghuuphuc/CVE-2024-4898-Poc
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation
URL:https://github.com/truonghuuphuc/CVE-2024-4898-Poc
标签:#CVE-2024
GitHub
GitHub - truonghuuphuc/CVE-2024-4898-Poc: CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing…
CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:DRive a poc backdoor exploiting CVE-2024-26229 for privilege escalation and persistence
URL:https://github.com/0XJ175/DRive
标签:#CVE-2024
更新了:CVE-2024
描述:DRive a poc backdoor exploiting CVE-2024-26229 for privilege escalation and persistence
URL:https://github.com/0XJ175/DRive
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/pandahacker2763/CVE-2024-24590
标签:#CVE-2024
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/pandahacker2763/CVE-2024-24590
标签:#CVE-2024
GitHub
GitHub - DemonPandaz2763/CVE-2024-24590: Another CVE-2024-24590 poc
Another CVE-2024-24590 poc. Contribute to DemonPandaz2763/CVE-2024-24590 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/DemonPandaz2763/CVE-2024-24590
标签:#CVE-2024
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/DemonPandaz2763/CVE-2024-24590
标签:#CVE-2024
GitHub
GitHub - DemonPandaz2763/CVE-2024-24590: Another CVE-2024-24590 poc
Another CVE-2024-24590 poc. Contribute to DemonPandaz2763/CVE-2024-24590 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/-
标签:#绕过
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/-
标签:#绕过
GitHub
GitHub - simpkinstimothy84/FUD-Crypter-Windows-Defender: 折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。. Contribute to simpkinstimothy84/FUD-Crypter-Windows-Defender development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Generate a base64 encoded Pickle RCE payload
URL:https://github.com/0xAlmighty/Pickle-Payload-Generator
标签:#RCE
更新了:RCE
描述:Generate a base64 encoded Pickle RCE payload
URL:https://github.com/0xAlmighty/Pickle-Payload-Generator
标签:#RCE
GitHub
GitHub - 0xAlmighty/Pickle-Payload-Generator: Generate base64 encoded Pickle payload
Generate base64 encoded Pickle payload. Contribute to 0xAlmighty/Pickle-Payload-Generator development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/FUD-Crypter-Windows-Defender
标签:#绕过
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/FUD-Crypter-Windows-Defender
标签:#绕过
GitHub
GitHub - simpkinstimothy84/FUD-Crypter-Windows-Defender: 折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。. Contribute to simpkinstimothy84/FUD-Crypter-Windows-Defender development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-4484
标签:#CVE-2024
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-4484
标签:#CVE-2024
GitHub
GitHub - Abo5/CVE-2024-4484: This script uses HTTParty to detect stored cross-site scripting (XSS) vulnerabilities in WordPress…
This script uses HTTParty to detect stored cross-site scripting (XSS) vulnerabilities in WordPress sites using the xai_username parameter. It sends a payload to the specified URL and checks if the ...