GitHub监控消息提醒!!!
更新了:免杀
描述:MetaDataSacker(元数据掠夺者):可将其他官方exe中数字签名,图标,详细信息复制到没有签名的EXE中,作为免杀,权限维持,伪装的一种小手段
URL:https://github.com/smallvoter/MetaDataSacker
标签:#免杀
更新了:免杀
描述:MetaDataSacker(元数据掠夺者):可将其他官方exe中数字签名,图标,详细信息复制到没有签名的EXE中,作为免杀,权限维持,伪装的一种小手段
URL:https://github.com/smallvoter/MetaDataSacker
标签:#免杀
GitHub
GitHub - smallvoter/MetaDataSacker: MetaDataSacker(元数据掠夺者):可将其他官方exe中数字签名,图标,详细信息复制到没有签名的EXE中,作为免杀,权限维持,伪装的一种小手段
MetaDataSacker(元数据掠夺者):可将其他官方exe中数字签名,图标,详细信息复制到没有签名的EXE中,作为免杀,权限维持,伪装的一种小手段 - smallvoter/MetaDataSacker
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PHP CGI Argument Injection (CVE-2024-4577) RCE
URL:https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix
标签:#CVE-2024
更新了:CVE-2024
描述:PHP CGI Argument Injection (CVE-2024-4577) RCE
URL:https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix
标签:#CVE-2024
GitHub
GitHub - almogopp/Disable-IPv6-CVE-2024-38063-Fix: A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability…
A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without n...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PHP CGI Argument Injection (CVE-2024-4577) RCE
URL:https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
标签:#CVE-2024
更新了:CVE-2024
描述:PHP CGI Argument Injection (CVE-2024-4577) RCE
URL:https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
标签:#CVE-2024
GitHub
GitHub - almogopp/OpenSSH-CVE-2024-6387-Fix: A Bash script to mitigate the CVE-2024-6387 vulnerability in OpenSSH by providing…
A Bash script to mitigate the CVE-2024-6387 vulnerability in OpenSSH by providing an option to upgrade to a secure version or apply a temporary workaround. This repository helps secure systems agai...
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-38063 RCE ipv6 Windows
URL:https://github.com/Skim1k/CVE-2024-38063
标签:#RCE
更新了:RCE
描述:CVE-2024-38063 RCE ipv6 Windows
URL:https://github.com/Skim1k/CVE-2024-38063
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-7928 fastadmin vulnerability POC & Scanning
URL:https://github.com/fa-rrel/CVE-2024-7928
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-7928 fastadmin vulnerability POC & Scanning
URL:https://github.com/fa-rrel/CVE-2024-7928
标签:#CVE-2024
GitHub
GitHub - gh-ost00/CVE-2024-7928: CVE-2024-7928 fastadmin vulnerability POC & Scanning
CVE-2024-7928 fastadmin vulnerability POC & Scanning - gh-ost00/CVE-2024-7928
GitHub监控消息提醒!!!
更新了:反序列化
描述:使用protobuf进行数据的序列化和反序列化,网络部分采用muduo网络库进行开发,使用zookeeper进行服务配置中心开发的rpc通信框架
URL:https://github.com/Danica627/mprpc
标签:#反序列化
更新了:反序列化
描述:使用protobuf进行数据的序列化和反序列化,网络部分采用muduo网络库进行开发,使用zookeeper进行服务配置中心开发的rpc通信框架
URL:https://github.com/Danica627/mprpc
标签:#反序列化
GitHub
GitHub - Danica627/mprpc: 使用protobuf进行数据的序列化和反序列化,网络部分采用muduo网络库进行开发,使用zookeeper进行服务配置中心开发的rpc通信框架
使用protobuf进行数据的序列化和反序列化,网络部分采用muduo网络库进行开发,使用zookeeper进行服务配置中心开发的rpc通信框架 - Danica627/mprpc
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof of concept CVE-2024-33896
URL:https://github.com/codeb0ss/CVE-2024-33896-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Proof of concept CVE-2024-33896
URL:https://github.com/codeb0ss/CVE-2024-33896-PoC
标签:#CVE-2024
GitHub
GitHub - codeb0ss/CVE-2024-33896-PoC: Proof of concept CVE-2024-33896
Proof of concept CVE-2024-33896 . Contribute to codeb0ss/CVE-2024-33896-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Spip Preauth RCE 2024 (Unauthenticated) exploit
URL:https://github.com/wh6amiGit/SPIP-RCE
标签:#RCE
更新了:RCE
描述:Spip Preauth RCE 2024 (Unauthenticated) exploit
URL:https://github.com/wh6amiGit/SPIP-RCE
标签:#RCE
GitHub
GitHub - wh6amiGit/SPIP-RCE: Spip Preauth RCE 2024 (Unauthenticated) exploit
Spip Preauth RCE 2024 (Unauthenticated) exploit. Contribute to wh6amiGit/SPIP-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE Runtime Images for running user code.
URL:https://github.com/ToolKitHub/rce-languages
标签:#RCE
更新了:RCE
描述:RCE Runtime Images for running user code.
URL:https://github.com/ToolKitHub/rce-languages
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Reproducing the following CVEs with dockerfile:CVE-2024-33644 CVE-2024-34370 CVE-2024-22120
URL:https://github.com/Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally
标签:#CVE-2024
更新了:CVE-2024
描述:Reproducing the following CVEs with dockerfile:CVE-2024-33644 CVE-2024-34370 CVE-2024-22120
URL:https://github.com/Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally
标签:#CVE-2024
GitHub
GitHub - Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally: Reproducing the following CVEs with dockerfile:CVE-2024-33644…
Reproducing the following CVEs with dockerfile:CVE-2024-33644 CVE-2024-34370 CVE-2024-22120 - Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection
URL:https://github.com/0xb0mb3r/CVE-2024-5932-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection
URL:https://github.com/0xb0mb3r/CVE-2024-5932-PoC
标签:#CVE-2024
GitHub
GitHub - 0xb0mb3r/CVE-2024-5932-PoC: Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection
Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection - GitHub - 0xb0mb3r/CVE-2024-5932-PoC: Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Arsenal are my personal docs which document everything I learn down the path of my career in cybersecurity.
URL:https://github.com/Acuyti/redteamarsenal
标签:#Red Team
更新了:Red Team
描述:Red Team Arsenal are my personal docs which document everything I learn down the path of my career in cybersecurity.
URL:https://github.com/Acuyti/redteamarsenal
标签:#Red Team
GitHub
GitHub - Acuyti/redteamarsenal: Red Team Arsenal are my personal docs which document everything I learn down the path of my career…
Red Team Arsenal are my personal docs which document everything I learn down the path of my career in cybersecurity. - Acuyti/redteamarsenal
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof of Concept code for interaction with Firewalla via Bluetooth Low-Energy and exploitation of CVE-2024-40892 / CVE-2024-40893
URL:https://github.com/xen0bit/fwbt
标签:#CVE-2024
更新了:CVE-2024
描述:Proof of Concept code for interaction with Firewalla via Bluetooth Low-Energy and exploitation of CVE-2024-40892 / CVE-2024-40893
URL:https://github.com/xen0bit/fwbt
标签:#CVE-2024
GitHub
GitHub - xen0bit/fwbt: Proof of Concept code for interaction with Firewalla via Bluetooth Low-Energy and exploitation of CVE-2024…
Proof of Concept code for interaction with Firewalla via Bluetooth Low-Energy and exploitation of CVE-2024-40892 / CVE-2024-40893 - xen0bit/fwbt
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:(CVE-2024-22263) Spring Cloud Dataflow Arbitrary File Writing Scanner
URL:https://github.com/securelayer7/CVE-2024-22263_Scanner
标签:#CVE-2024
更新了:CVE-2024
描述:(CVE-2024-22263) Spring Cloud Dataflow Arbitrary File Writing Scanner
URL:https://github.com/securelayer7/CVE-2024-22263_Scanner
标签:#CVE-2024
GitHub
GitHub - securelayer7/CVE-2024-22263_Scanner: (CVE-2024-22263) Spring Cloud Dataflow Arbitrary File Writing Scanner
(CVE-2024-22263) Spring Cloud Dataflow Arbitrary File Writing Scanner - securelayer7/CVE-2024-22263_Scanner
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-38856 Exploit
URL:https://github.com/0x20c/CVE-2024-38856-EXP
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-38856 Exploit
URL:https://github.com/0x20c/CVE-2024-38856-EXP
标签:#CVE-2024
GitHub
GitHub - 0x20c/CVE-2024-38856-EXP: CVE-2024-38856 Exploit
CVE-2024-38856 Exploit. Contribute to 0x20c/CVE-2024-38856-EXP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-42992
URL:https://github.com/juwenyi/CVE-2024-42992
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-42992
URL:https://github.com/juwenyi/CVE-2024-42992
标签:#CVE-2024