GitHub监控消息提醒!!!
更新了:Red Team
描述:Collection of OPSEC Tradecraft and TTPs for Red Team Operations
URL:https://github.com/uruc/Active-Directory-Lab
标签:#Red Team
更新了:Red Team
描述:Collection of OPSEC Tradecraft and TTPs for Red Team Operations
URL:https://github.com/uruc/Active-Directory-Lab
标签:#Red Team
GitHub
GitHub - uruc/Active-Directory-Lab: This project sets up an Active Directory environment and configures Splunk to ingest events…
This project sets up an Active Directory environment and configures Splunk to ingest events from a Windows Server and a target machine. We perform a brute force attack using Kali Linux to observe t...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-36837 POC
URL:https://github.com/phtcloud-dev/CVE-2024-36837
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-36837 POC
URL:https://github.com/phtcloud-dev/CVE-2024-36837
标签:#CVE-2024
GitHub
GitHub - phtcloud-dev/CVE-2024-36837: CVE-2024-36837 | CNVD-2024-30128 POC
CVE-2024-36837 | CNVD-2024-30128 POC. Contribute to phtcloud-dev/CVE-2024-36837 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PHP CGI Remote Code Execution (CVE-2024-4577) PoC
URL:https://github.com/sug4r-wr41th/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:PHP CGI Remote Code Execution (CVE-2024-4577) PoC
URL:https://github.com/sug4r-wr41th/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - sug4r-wr41th/CVE-2024-4577: PHP CGI CVE-2024-4577 PoC
PHP CGI CVE-2024-4577 PoC. Contribute to sug4r-wr41th/CVE-2024-4577 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:integration for Rynkowa cena energii elektrycznej (RCE)
URL:https://github.com/PePeLLee/home-assistant-rce
标签:#RCE
更新了:RCE
描述:integration for Rynkowa cena energii elektrycznej (RCE)
URL:https://github.com/PePeLLee/home-assistant-rce
标签:#RCE
GitHub
GitHub - PePeLLee/home-assistant-rce: integration for Rynkowa cena energii elektrycznej (RCE)
integration for Rynkowa cena energii elektrycznej (RCE) - PePeLLee/home-assistant-rce
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-30078 Detection and Command Execution Script
URL:https://github.com/alperenugurlu/CVE-2024-30078-
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-30078 Detection and Command Execution Script
URL:https://github.com/alperenugurlu/CVE-2024-30078-
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Python script for get reverse shell with using CVE-2024-4577
URL:https://github.com/AlperenY-cs/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:Python script for get reverse shell with using CVE-2024-4577
URL:https://github.com/AlperenY-cs/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - AlperenY-cs/CVE-2024-4577: Create lab for CVE-2024-4577
Create lab for CVE-2024-4577. Contribute to AlperenY-cs/CVE-2024-4577 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Python script for get reverse shell with using CVE-2024-4577
URL:https://github.com/team-MineDEV/CVE-2024-26229
标签:#CVE-2024
更新了:CVE-2024
描述:Python script for get reverse shell with using CVE-2024-4577
URL:https://github.com/team-MineDEV/CVE-2024-26229
标签:#CVE-2024
GitHub
GitHub - team-MineDEV/CVE-2024-26229: Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并…
Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYST...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23692 exp
URL:https://github.com/Tupler/CVE-2024-23692-exp
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23692 exp
URL:https://github.com/Tupler/CVE-2024-23692-exp
标签:#CVE-2024
GitHub
GitHub - Tupler/CVE-2024-23692-exp: CVE-2024-23692 exp
CVE-2024-23692 exp. Contribute to Tupler/CVE-2024-23692-exp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:Extraction and decryption of webshell traffic from packet captures
URL:https://github.com/rb3nzr/WSTDecryptor
标签:#webshell
更新了:webshell
描述:Extraction and decryption of webshell traffic from packet captures
URL:https://github.com/rb3nzr/WSTDecryptor
标签:#webshell
GitHub
GitHub - rb3nzr/WSTDecryptor: Extraction and decryption of webshell traffic from packet captures
Extraction and decryption of webshell traffic from packet captures - rb3nzr/WSTDecryptor
GitHub监控消息提醒!!!
更新了:代码审计
描述:富婆系列,代码审计辅助工具,致力于解放大脑,方便双手
URL:https://github.com/novysodope/javaeasyscan
标签:#代码审计
更新了:代码审计
描述:富婆系列,代码审计辅助工具,致力于解放大脑,方便双手
URL:https://github.com/novysodope/javaeasyscan
标签:#代码审计
GitHub
GitHub - novysodope/javaeasyscan: javaeasyscanner - 富婆系列,代码审计辅助工具,致力于解放大脑,方便双手
javaeasyscanner - 富婆系列,代码审计辅助工具,致力于解放大脑,方便双手. Contribute to novysodope/javaeasyscan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:An edited version of H4RK3NZ0's Wifi Mouse 1.7.8.5 RCE exploit, patching the errors and adding functionality.
URL:https://github.com/EduWoldhuis/Wifi_mouse_1.7.8.5_exploit
标签:#RCE
更新了:RCE
描述:An edited version of H4RK3NZ0's Wifi Mouse 1.7.8.5 RCE exploit, patching the errors and adding functionality.
URL:https://github.com/EduWoldhuis/Wifi_mouse_1.7.8.5_exploit
标签:#RCE
GitHub
GitHub - EduWoldhuis/Wifi_mouse_1.7.8.5_exploit: An edited version of H4RK3NZ0's Wifi Mouse 1.7.8.5 RCE exploit, patching the errors…
An edited version of H4RK3NZ0's Wifi Mouse 1.7.8.5 RCE exploit, patching the errors and adding functionality. - EduWoldhuis/Wifi_mouse_1.7.8.5_exploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
URL:https://github.com/vin01/poc-cve-2024-38396
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
URL:https://github.com/vin01/poc-cve-2024-38396
标签:#CVE-2024
GitHub
GitHub - vin01/poc-cve-2024-38396: PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution - vin01/poc-cve-2024-38396
GitHub监控消息提醒!!!
更新了:RCE
描述:Webserver we use for our RCE
URL:https://github.com/Solara-RCE/webserver
标签:#RCE
更新了:RCE
描述:Webserver we use for our RCE
URL:https://github.com/Solara-RCE/webserver
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit of CVE-2024-0757 (Insert or Embed Articulate Content into WordPress <= 4.3000000023 - Authenticated - Upload to RCE)
URL:https://github.com/hunThubSpace/CVE-2024-0757
标签:#RCE
更新了:RCE
描述:Exploit of CVE-2024-0757 (Insert or Embed Articulate Content into WordPress <= 4.3000000023 - Authenticated - Upload to RCE)
URL:https://github.com/hunThubSpace/CVE-2024-0757
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)
URL:https://github.com/hunThubSpace/CVE-2024-0757-Exploit
标签:#CVE-2024
更新了:CVE-2024
描述:A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)
URL:https://github.com/hunThubSpace/CVE-2024-0757-Exploit
标签:#CVE-2024
GitHub
GitHub - hunThubSpace/CVE-2024-0757-Exploit: A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress…
A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE) - hunThubSpace/CVE-2024-0757-Exploit
GitHub监控消息提醒!!!
更新了:免杀
描述:php大马,asp大马,中国菜刀,免杀PHP大马,PHP大马下载,PHP木马下载,中国菜刀下载
URL:https://github.com/vipfox8/webshell
标签:#免杀
更新了:免杀
描述:php大马,asp大马,中国菜刀,免杀PHP大马,PHP大马下载,PHP木马下载,中国菜刀下载
URL:https://github.com/vipfox8/webshell
标签:#免杀
GitHub
GitHub - vipfox8/webshell: php大马,asp大马,中国菜刀,免杀PHP大马,PHP大马下载,PHP木马下载,中国菜刀下载
php大马,asp大马,中国菜刀,免杀PHP大马,PHP大马下载,PHP木马下载,中国菜刀下载. Contribute to vipfox8/webshell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内存马
描述:Python内存马管理工具 Python MemShell
URL:https://github.com/orzchen/PyMemShell
标签:#内存马
更新了:内存马
描述:Python内存马管理工具 Python MemShell
URL:https://github.com/orzchen/PyMemShell
标签:#内存马
GitHub
GitHub - orzchen/PyMemShell: Python内存马管理工具 Python MemShell
Python内存马管理工具 Python MemShell. Contribute to orzchen/PyMemShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23692
URL:https://github.com/BBD-YZZ/CVE-2024-23692
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23692
URL:https://github.com/BBD-YZZ/CVE-2024-23692
标签:#CVE-2024
GitHub
GitHub - BBD-YZZ/CVE-2024-23692: CVE-2024-23692
CVE-2024-23692. Contribute to BBD-YZZ/CVE-2024-23692 development by creating an account on GitHub.