GitHub监控消息提醒!!!
更新了:Red Team
描述:DefCon Red Team Village 2023 Workshop on DLL Sideloading
URL:https://github.com/mwnickerson/RedTeamVillage2023-DLL-Sideloading
标签:#Red Team
更新了:Red Team
描述:DefCon Red Team Village 2023 Workshop on DLL Sideloading
URL:https://github.com/mwnickerson/RedTeamVillage2023-DLL-Sideloading
标签:#Red Team
GitHub
GitHub - mwnickerson/RedTeamVillage2023-DLL-Sideloading: DefCon Red Team Village 2023 Workshop on DLL Sideloading
DefCon Red Team Village 2023 Workshop on DLL Sideloading - mwnickerson/RedTeamVillage2023-DLL-Sideloading
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-4174 PoC
URL:https://github.com/d0rb/CVE-2023-4174
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-4174 PoC
URL:https://github.com/d0rb/CVE-2023-4174
标签:#CVE-2023
GitHub
GitHub - d0rb/CVE-2023-4174: CVE-2023-4174 PoC
CVE-2023-4174 PoC. Contribute to d0rb/CVE-2023-4174 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:使用 Termux 执行这个脚本来安装资源包以绕过登录对话框
URL:https://github.com/Webpage-gh/Bypass-MC-Education-Edition-login
标签:#绕过
更新了:绕过
描述:使用 Termux 执行这个脚本来安装资源包以绕过登录对话框
URL:https://github.com/Webpage-gh/Bypass-MC-Education-Edition-login
标签:#绕过
GitHub监控消息提醒!!!
更新了:webshell
描述:Membersihkan folder yang sudah kena webshell [403WebShell](https://github.com/yon3zu/403WebShell/tree/main) atau sejenisnya.
URL:https://github.com/3vluzi/Hapus-File-dan-Folder-Webshell
标签:#webshell
更新了:webshell
描述:Membersihkan folder yang sudah kena webshell [403WebShell](https://github.com/yon3zu/403WebShell/tree/main) atau sejenisnya.
URL:https://github.com/3vluzi/Hapus-File-dan-Folder-Webshell
标签:#webshell
GitHub
GitHub - yon3zu/403WebShell: 99% Bypassed Litespeed Server / 403 Forbidden
99% Bypassed Litespeed Server / 403 Forbidden. Contribute to yon3zu/403WebShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-36899 PoC
URL:https://github.com/d0rb/CVE-2023-36899
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-36899 PoC
URL:https://github.com/d0rb/CVE-2023-36899
标签:#CVE-2023
GitHub
GitHub - d0rb/CVE-2023-36899: CVE-2023-36899 PoC
CVE-2023-36899 PoC. Contribute to d0rb/CVE-2023-36899 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Check for CVE-2023-32629 \"GameOver(lay)\" vulnerability
URL:https://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay
标签:#CVE-2023
更新了:CVE-2023
描述:Check for CVE-2023-32629 \"GameOver(lay)\" vulnerability
URL:https://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay
标签:#CVE-2023
GitHub
GitHub - kaotickj/Check-for-CVE-2023-32629-GameOver-lay: Check for CVE-2023-32629 "GameOver(lay)" vulnerability
Check for CVE-2023-32629 "GameOver(lay)" vulnerability - GitHub - kaotickj/Check-for-CVE-2023-32629-GameOver-lay: Check for CVE-2023-32629 "GameOver(lay)" vulnerability
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI agent for Red Team
URL:https://github.com/niwasmala/red-agent
标签:#Red Team
更新了:Red Team
描述:AI agent for Red Team
URL:https://github.com/niwasmala/red-agent
标签:#Red Team
GitHub
GitHub - niwasmala/redagent: AI agent for Red Team
AI agent for Red Team. Contribute to niwasmala/redagent development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike is a dark blue inspired theme for Standard Notes
URL:https://github.com/m00t316/cobalt-strike
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike is a dark blue inspired theme for Standard Notes
URL:https://github.com/m00t316/cobalt-strike
标签:#Cobalt Strike
❤1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name.
URL:https://github.com/dhmosfunk/HTTP3ONSTEROIDS
标签:#CVE-2023
更新了:CVE-2023
描述:HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name.
URL:https://github.com/dhmosfunk/HTTP3ONSTEROIDS
标签:#CVE-2023
GitHub
GitHub - dhmosfunk/HTTP3ONSTEROIDS: HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails…
HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name. - dhmosfunk/HTTP3ONSTEROIDS
GitHub监控消息提醒!!!
更新了:Red Team
描述:Tool to easily install Kali Linux tools on Ubuntu to make it a distro suitable for a Red Team
URL:https://github.com/Sfrisio/redbuntu
标签:#Red Team
更新了:Red Team
描述:Tool to easily install Kali Linux tools on Ubuntu to make it a distro suitable for a Red Team
URL:https://github.com/Sfrisio/redbuntu
标签:#Red Team
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Resources ⚔️ 🛡 🥷🏼
URL:https://github.com/pwnatic/Red-Teaming-101
标签:#Red Team
更新了:Red Team
描述:Red Teaming Resources ⚔️ 🛡 🥷🏼
URL:https://github.com/pwnatic/Red-Teaming-101
标签:#Red Team
GitHub
pwnatic/Red-Teaming-101
Red Teaming Resources ⚔️ 🛡 🥷🏼. Contribute to pwnatic/Red-Teaming-101 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:免杀
描述:Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。
URL:https://github.com/ZackSecurity/Phobos
标签:#免杀
更新了:免杀
描述:Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。
URL:https://github.com/ZackSecurity/Phobos
标签:#免杀
GitHub
GitHub - ZackSecurity/Phobos: Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。
Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。 - ZackSecurity/Phobos
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Ghostscript command injection vulnerability PoC (CVE-2023-36664)
URL:https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection
标签:#CVE-2023
更新了:CVE-2023
描述:Ghostscript command injection vulnerability PoC (CVE-2023-36664)
URL:https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection
标签:#CVE-2023
GitHub
GitHub - jakabakos/CVE-2023-36664-Ghostscript-command-injection: Ghostscript command injection vulnerability PoC (CVE-2023-36664)
Ghostscript command injection vulnerability PoC (CVE-2023-36664) - jakabakos/CVE-2023-36664-Ghostscript-command-injection
👎1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Golang PoC for CVE-2023-27163 Mailtrail Exploit
URL:https://github.com/thomas-osgood/CVE-2023-27163
标签:#CVE-2023
更新了:CVE-2023
描述:Golang PoC for CVE-2023-27163 Mailtrail Exploit
URL:https://github.com/thomas-osgood/CVE-2023-27163
标签:#CVE-2023
GitHub
GitHub - thomas-osgood/CVE-2023-27163: Golang PoC for CVE-2023-27163 Mailtrail Exploit
Golang PoC for CVE-2023-27163 Mailtrail Exploit. Contribute to thomas-osgood/CVE-2023-27163 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF)
URL:https://github.com/0xFTW/CVE-2023-27163
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF)
URL:https://github.com/0xFTW/CVE-2023-27163
标签:#CVE-2023
GitHub
GitHub - cowsecurity/CVE-2023-27163: CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF)
CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF) - cowsecurity/CVE-2023-27163
😁1
GitHub监控消息提醒!!!
更新了:代码注入
描述:实现 Go 语言装饰器功能的编译链工具。它可以让 Go 语言使用简单的注释注解来装饰函数方法,完成样板代码注入,改变函数行为,就像其他语言的装饰器一样的体验!(比如 Python)
URL:https://github.com/dengsgo/go-decorator
标签:#代码注入
更新了:代码注入
描述:实现 Go 语言装饰器功能的编译链工具。它可以让 Go 语言使用简单的注释注解来装饰函数方法,完成样板代码注入,改变函数行为,就像其他语言的装饰器一样的体验!(比如 Python)
URL:https://github.com/dengsgo/go-decorator
标签:#代码注入
GitHub
GitHub - dengsgo/go-decorator: 让 Go 便捷使用装饰器的工具,装饰器能够切面 (AOP)、代理 (Proxy) 任意的函数和方法,提供观察和控制函数的能力。go-decorator is a tool that allows…
让 Go 便捷使用装饰器的工具,装饰器能够切面 (AOP)、代理 (Proxy) 任意的函数和方法,提供观察和控制函数的能力。go-decorator is a tool that allows Go to easily use decorators. The decorator can slice aspect (AOP) and proxy any function and method...