GitHub监控消息提醒!!!
更新了:webshell
描述:Scan IIS log for SQL injection, file inclusion and webshell attack.
URL:https://github.com/uaibol/logscanner
标签:#webshell
更新了:webshell
描述:Scan IIS log for SQL injection, file inclusion and webshell attack.
URL:https://github.com/uaibol/logscanner
标签:#webshell
GitHub
GitHub - uaibol/logscanner: Scan log for SQL injection
Scan log for SQL injection. Contribute to uaibol/logscanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass av
描述:风暴免杀-bypass defender、360、vt
URL:https://github.com/StormEyePro/StormBypassAV
标签:#bypass av
更新了:bypass av
描述:风暴免杀-bypass defender、360、vt
URL:https://github.com/StormEyePro/StormBypassAV
标签:#bypass av
GitHub
GitHub - StormEyePro/StormBypassAV: 风暴免杀-bypass defender、360、vt
风暴免杀-bypass defender、360、vt. Contribute to StormEyePro/StormBypassAV development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:A POC for the all new CVE-2023-27524 which allows for authentication bypass and gaining access to the admin dashboard.
URL:https://github.com/MaanVader/CVE-2023-27524-POC
标签:#CVE-2023
更新了:CVE-2023
描述:A POC for the all new CVE-2023-27524 which allows for authentication bypass and gaining access to the admin dashboard.
URL:https://github.com/MaanVader/CVE-2023-27524-POC
标签:#CVE-2023
GitHub
GitHub - MaanVader/CVE-2023-27524-POC: A POC for the all new CVE-2023-27524 which allows for authentication bypass and gaining…
A POC for the all new CVE-2023-27524 which allows for authentication bypass and gaining access to the admin dashboard. - MaanVader/CVE-2023-27524-POC
👍1
GitHub监控消息提醒!!!
更新了:Red Team
描述:A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional) exam.
URL:https://github.com/sabrinalupsan/pentesting-azure-ad
标签:#Red Team
更新了:Red Team
描述:A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional) exam.
URL:https://github.com/sabrinalupsan/pentesting-azure-ad
标签:#Red Team
GitHub
GitHub - sabrinalupsan/pentesting-azure-ad: A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional)…
A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional) exam. - sabrinalupsan/pentesting-azure-ad
👍2
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-0386在ubuntu22.04上的提权
URL:https://github.com/xkaneiki/CVE-2023-0386
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-0386在ubuntu22.04上的提权
URL:https://github.com/xkaneiki/CVE-2023-0386
标签:#CVE-2023
GitHub
GitHub - xkaneiki/CVE-2023-0386: CVE-2023-0386在ubuntu22.04上的提权
CVE-2023-0386在ubuntu22.04上的提权. Contribute to xkaneiki/CVE-2023-0386 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:飞刃是一套完整的企业级黑盒漏洞扫描系统,集成漏洞扫描、漏洞管理、扫描资产、爬虫等服务。 拥有强大的漏洞检测引擎和丰富的插件库,覆盖多种漏洞类型和应用程序框架。
URL:https://github.com/tongcheng-security-team/NextScan
标签:#漏洞检测
更新了:漏洞检测
描述:飞刃是一套完整的企业级黑盒漏洞扫描系统,集成漏洞扫描、漏洞管理、扫描资产、爬虫等服务。 拥有强大的漏洞检测引擎和丰富的插件库,覆盖多种漏洞类型和应用程序框架。
URL:https://github.com/tongcheng-security-team/NextScan
标签:#漏洞检测
GitHub
GitHub - tongcheng-security-team/NextScan: 飞刃是一套完整的企业级黑盒漏洞扫描系统,集成漏洞扫描、漏洞管理、扫描资产、爬虫等服务。 拥有强大的漏洞检测引擎和丰富的插件库,覆盖多种漏洞类型和应用程序框架。
飞刃是一套完整的企业级黑盒漏洞扫描系统,集成漏洞扫描、漏洞管理、扫描资产、爬虫等服务。 拥有强大的漏洞检测引擎和丰富的插件库,覆盖多种漏洞类型和应用程序框架。 - tongcheng-security-team/NextScan
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-29489 mass exploit
URL:https://github.com/1337r0j4n/CVE-2023-29489
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-29489 mass exploit
URL:https://github.com/1337r0j4n/CVE-2023-29489
标签:#CVE-2023
GitHub
GitHub - 1337r0j4n/CVE-2023-29489: CVE-2023-29489 mass exploit
CVE-2023-29489 mass exploit. Contribute to 1337r0j4n/CVE-2023-29489 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:An exploit of CVE-2023-0386, verified on 5.19.0-38-generic #39~22.04.1-Ubuntu
URL:https://github.com/JlSakuya/CVE-2023-0386
标签:#CVE-2023
更新了:CVE-2023
描述:An exploit of CVE-2023-0386, verified on 5.19.0-38-generic #39~22.04.1-Ubuntu
URL:https://github.com/JlSakuya/CVE-2023-0386
标签:#CVE-2023
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:一款针对Shiro550漏洞进行快速漏洞利用工具。 对 @SummerSec 大佬的项目https://github.com/SummerSec/ShiroAttack2 进行了一些改进。
URL:https://github.com/altEr1125/ShiroAttack2
标签:#漏洞利用
更新了:漏洞利用
描述:一款针对Shiro550漏洞进行快速漏洞利用工具。 对 @SummerSec 大佬的项目https://github.com/SummerSec/ShiroAttack2 进行了一些改进。
URL:https://github.com/altEr1125/ShiroAttack2
标签:#漏洞利用
GitHub
GitHub - SummerSec/ShiroAttack2: shiro反序列化漏洞综合利用,包含(回显执行命令/注入内存马)修复原版中NoCC的问题 https://github.com/j1anFen/shiro_attack
shiro反序列化漏洞综合利用,包含(回显执行命令/注入内存马)修复原版中NoCC的问题 https://github.com/j1anFen/shiro_attack - SummerSec/ShiroAttack2
GitHub监控消息提醒!!!
更新了:渗透测试
描述:ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息,渗透测试poc
URL:https://github.com/FeiNiao/ClickHouse-database-unauthorized
标签:#渗透测试
更新了:渗透测试
描述:ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息,渗透测试poc
URL:https://github.com/FeiNiao/ClickHouse-database-unauthorized
标签:#渗透测试
GitHub
GitHub - FeiNiao/ClickHouse-database-unauthorized: ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息
ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息 - FeiNiao/ClickHouse-database-unauthorized
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-0386 analysis and Exp
URL:https://github.com/chenaotian/CVE-2023-0386
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-0386 analysis and Exp
URL:https://github.com/chenaotian/CVE-2023-0386
标签:#CVE-2023
GitHub
GitHub - chenaotian/CVE-2023-0386: CVE-2023-0386 analysis and Exp
CVE-2023-0386 analysis and Exp. Contribute to chenaotian/CVE-2023-0386 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试人员专用精简化字典 Dictionary for penetration testers happy hacker
URL:https://github.com/3vilc0de/PentesterSpecialDict
标签:#渗透测试
更新了:渗透测试
描述:渗透测试人员专用精简化字典 Dictionary for penetration testers happy hacker
URL:https://github.com/3vilc0de/PentesterSpecialDict
标签:#渗透测试
GitHub
GitHub - evilc0deooo/PentesterSpecialDict: 构建优化高效的渗透 fuzz 字典合集
构建优化高效的渗透 fuzz 字典合集. Contribute to evilc0deooo/PentesterSpecialDict development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红队
描述:检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team battle.
URL:https://github.com/808Mak1r/CEmail
标签:#红队
更新了:红队
描述:检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team battle.
URL:https://github.com/808Mak1r/CEmail
标签:#红队
GitHub
GitHub - 808Mak1r/CEmail: 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox…
检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team battle. - 808Mak1r/CEmail