GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Automated Exploit for CVE-2024-34716 for Prestashop.
URL:https://github.com/atirjavid/Prestashop_CVE-2024-34716
标签:#CVE-2024
更新了:CVE-2024
描述:Automated Exploit for CVE-2024-34716 for Prestashop.
URL:https://github.com/atirjavid/Prestashop_CVE-2024-34716
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:代码审计
描述:sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于devsecops以外,还可以用于安全行业从事者学习漏洞知识或者渗透知识,代码审计,提供了一个实践和学习的环境。本项目采用了前后端分离的设计模式,其中后端利用了轻量级框架 Gin,而前端则使用了 Vue 3。
URL:https://github.com/Night-Master/sdlc_golang
标签:#代码审计
更新了:代码审计
描述:sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于devsecops以外,还可以用于安全行业从事者学习漏洞知识或者渗透知识,代码审计,提供了一个实践和学习的环境。本项目采用了前后端分离的设计模式,其中后端利用了轻量级框架 Gin,而前端则使用了 Vue 3。
URL:https://github.com/Night-Master/sdlc_golang
标签:#代码审计
GitHub
GitHub - Night-Master/sdlc_golang: sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于…
sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于devsecops以外,还可以用于安全行业从事者学习漏洞知识或者渗透知识,代码审计,提供了一个实践和学习的环境。本项目采用了前后端分离的设计模式,其中后端利用了轻量级框架 Gin,而前端则使用了 Vue 3。 -...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE
URL:https://github.com/KTN1990/CVE-2024-43918
标签:#CVE-2024
更新了:CVE-2024
描述:WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE
URL:https://github.com/KTN1990/CVE-2024-43918
标签:#CVE-2024
GitHub
GitHub - KTN1990/CVE-2024-43918: WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE
WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE - KTN1990/CVE-2024-43918
👍1
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Hands-On Projects
URL:https://github.com/Jameelaf/Red-Teaming
标签:#Red Team
更新了:Red Team
描述:Red Teaming Hands-On Projects
URL:https://github.com/Jameelaf/Red-Teaming
标签:#Red Team
GitHub
GitHub - Jameelaf/Red-Teaming: Red Teaming Hands-On Projects
Red Teaming Hands-On Projects. Contribute to Jameelaf/Red-Teaming development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-5932
URL:https://github.com/l8BL/CVE-2024-47066
标签:#CVE-2024
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-5932
URL:https://github.com/l8BL/CVE-2024-47066
标签:#CVE-2024
GitHub
GitHub - l8BL/CVE-2024-47066: Proof-of-Concept for CVE-2024-47066
Proof-of-Concept for CVE-2024-47066. Contribute to l8BL/CVE-2024-47066 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:WooCommerce RCE POC for WP < 6.5
URL:https://github.com/prj0cve/woocommerce-rce
标签:#RCE
更新了:RCE
描述:WooCommerce RCE POC for WP < 6.5
URL:https://github.com/prj0cve/woocommerce-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-7593 Ivanti Virtual Traffic Manager 22.2R1 / 22.7R2 Admin Panel Authentication Bypass PoC [EXPLOIT]
URL:https://github.com/D3N14LD15K/CVE-2024-7593_PoC_Exploit
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-7593 Ivanti Virtual Traffic Manager 22.2R1 / 22.7R2 Admin Panel Authentication Bypass PoC [EXPLOIT]
URL:https://github.com/D3N14LD15K/CVE-2024-7593_PoC_Exploit
标签:#CVE-2024
GitHub
GitHub - D3N14LD15K/CVE-2024-7593_PoC_Exploit: CVE-2024-7593 Ivanti Virtual Traffic Manager 22.2R1 / 22.7R2 Admin Panel Authentication…
CVE-2024-7593 Ivanti Virtual Traffic Manager 22.2R1 / 22.7R2 Admin Panel Authentication Bypass PoC [EXPLOIT] - D3N14LD15K/CVE-2024-7593_PoC_Exploit
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE and XSS exploits testing
URL:https://github.com/Astolfomiaw1/XSS
标签:#RCE
更新了:RCE
描述:RCE and XSS exploits testing
URL:https://github.com/Astolfomiaw1/XSS
标签:#RCE
GitHub
GitHub - Astolfomiaw1/XSS: RCE and XSS exploits testing
RCE and XSS exploits testing. Contribute to Astolfomiaw1/XSS development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Follow my cybersecurity journey as I explore CTF, Red Teaming, and Malware Analysis. Dive into challenges, insights, and discoveries.
URL:https://github.com/NyxByt3/nyxbyt3.github.io
标签:#Red Team
更新了:Red Team
描述:Follow my cybersecurity journey as I explore CTF, Red Teaming, and Malware Analysis. Dive into challenges, insights, and discoveries.
URL:https://github.com/NyxByt3/nyxbyt3.github.io
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-38816 Proof of Concept
URL:https://github.com/masa42/CVE-2024-38816-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-38816 Proof of Concept
URL:https://github.com/masa42/CVE-2024-38816-PoC
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.
URL:https://github.com/d4lyw/CVE-2024-46627
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.
URL:https://github.com/d4lyw/CVE-2024-46627
标签:#CVE-2024
GitHub
GitHub - d4lyw/CVE-2024-46627: CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary…
CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests. - d4lyw/CVE-2024-46627
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC CVE-2024-7646
URL:https://github.com/dovics/cve-2024-7646
标签:#CVE-2024
更新了:CVE-2024
描述:PoC CVE-2024-7646
URL:https://github.com/dovics/cve-2024-7646
标签:#CVE-2024
GitHub
GitHub - dovics/cve-2024-7646: PoC CVE-2024-7646
PoC CVE-2024-7646. Contribute to dovics/cve-2024-7646 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:反序列化
描述:通过xml文件生成c++类(.h和.cc文件)并实现序列化与反序列化 Generate C++ classes (.h and .cc files) from XML files and implement serialization and deserialization
URL:https://github.com/chichi-9527/potatobuf
标签:#反序列化
更新了:反序列化
描述:通过xml文件生成c++类(.h和.cc文件)并实现序列化与反序列化 Generate C++ classes (.h and .cc files) from XML files and implement serialization and deserialization
URL:https://github.com/chichi-9527/potatobuf
标签:#反序列化
GitHub
GitHub - chichi-9527/potatobuf: 通过xml文件生成c++类(.h和.cc文件)并实现序列化与反序列化 Generate C++ classes (.h and .cc files) from XML files…
通过xml文件生成c++类(.h和.cc文件)并实现序列化与反序列化 Generate C++ classes (.h and .cc files) from XML files and implement serialization and deserialization - chichi-9527/potatobuf
GitHub监控消息提醒!!!
更新了:RCE
描述:PoCs of RCEs against open source C2 servers.
URL:https://github.com/hyperreality/c2-vulnerabilities
标签:#RCE
更新了:RCE
描述:PoCs of RCEs against open source C2 servers.
URL:https://github.com/hyperreality/c2-vulnerabilities
标签:#RCE
GitHub
GitHub - hyperreality/c2-vulnerabilities: PoCs of RCEs against open source C2 servers
PoCs of RCEs against open source C2 servers. Contribute to hyperreality/c2-vulnerabilities development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability
URL:https://github.com/passtheticket/CVE-2024-38200
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability
URL:https://github.com/passtheticket/CVE-2024-38200
标签:#CVE-2024
GitHub
GitHub - passtheticket/CVE-2024-38200: CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability
CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability - passtheticket/CVE-2024-38200