GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Check for CVE-2023-32629 \"GameOver(lay)\" vulnerability
URL:https://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay
标签:#CVE-2023
更新了:CVE-2023
描述:Check for CVE-2023-32629 \"GameOver(lay)\" vulnerability
URL:https://github.com/kaotickj/Check-for-CVE-2023-32629-GameOver-lay
标签:#CVE-2023
GitHub
GitHub - kaotickj/Check-for-CVE-2023-32629-GameOver-lay: Check for CVE-2023-32629 "GameOver(lay)" vulnerability
Check for CVE-2023-32629 "GameOver(lay)" vulnerability - GitHub - kaotickj/Check-for-CVE-2023-32629-GameOver-lay: Check for CVE-2023-32629 "GameOver(lay)" vulnerability
GitHub监控消息提醒!!!
更新了:Red Team
描述:AI agent for Red Team
URL:https://github.com/niwasmala/red-agent
标签:#Red Team
更新了:Red Team
描述:AI agent for Red Team
URL:https://github.com/niwasmala/red-agent
标签:#Red Team
GitHub
GitHub - niwasmala/redagent: AI agent for Red Team
AI agent for Red Team. Contribute to niwasmala/redagent development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike is a dark blue inspired theme for Standard Notes
URL:https://github.com/m00t316/cobalt-strike
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike is a dark blue inspired theme for Standard Notes
URL:https://github.com/m00t316/cobalt-strike
标签:#Cobalt Strike
❤1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name.
URL:https://github.com/dhmosfunk/HTTP3ONSTEROIDS
标签:#CVE-2023
更新了:CVE-2023
描述:HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name.
URL:https://github.com/dhmosfunk/HTTP3ONSTEROIDS
标签:#CVE-2023
GitHub
GitHub - dhmosfunk/HTTP3ONSTEROIDS: HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails…
HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name. - dhmosfunk/HTTP3ONSTEROIDS
GitHub监控消息提醒!!!
更新了:Red Team
描述:Tool to easily install Kali Linux tools on Ubuntu to make it a distro suitable for a Red Team
URL:https://github.com/Sfrisio/redbuntu
标签:#Red Team
更新了:Red Team
描述:Tool to easily install Kali Linux tools on Ubuntu to make it a distro suitable for a Red Team
URL:https://github.com/Sfrisio/redbuntu
标签:#Red Team
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Teaming Resources ⚔️ 🛡 🥷🏼
URL:https://github.com/pwnatic/Red-Teaming-101
标签:#Red Team
更新了:Red Team
描述:Red Teaming Resources ⚔️ 🛡 🥷🏼
URL:https://github.com/pwnatic/Red-Teaming-101
标签:#Red Team
GitHub
pwnatic/Red-Teaming-101
Red Teaming Resources ⚔️ 🛡 🥷🏼. Contribute to pwnatic/Red-Teaming-101 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:免杀
描述:Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。
URL:https://github.com/ZackSecurity/Phobos
标签:#免杀
更新了:免杀
描述:Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。
URL:https://github.com/ZackSecurity/Phobos
标签:#免杀
GitHub
GitHub - ZackSecurity/Phobos: Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。
Phobos 是一款红队专用免杀木马生成器,采用 PEM 加密动态嵌入 XOR 的方式生成木马,生成木马可以自定义名称和ICO图标,为了延长免杀时间本工具暂时不开源。 - ZackSecurity/Phobos
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Ghostscript command injection vulnerability PoC (CVE-2023-36664)
URL:https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection
标签:#CVE-2023
更新了:CVE-2023
描述:Ghostscript command injection vulnerability PoC (CVE-2023-36664)
URL:https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection
标签:#CVE-2023
GitHub
GitHub - jakabakos/CVE-2023-36664-Ghostscript-command-injection: Ghostscript command injection vulnerability PoC (CVE-2023-36664)
Ghostscript command injection vulnerability PoC (CVE-2023-36664) - jakabakos/CVE-2023-36664-Ghostscript-command-injection
👎1
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Golang PoC for CVE-2023-27163 Mailtrail Exploit
URL:https://github.com/thomas-osgood/CVE-2023-27163
标签:#CVE-2023
更新了:CVE-2023
描述:Golang PoC for CVE-2023-27163 Mailtrail Exploit
URL:https://github.com/thomas-osgood/CVE-2023-27163
标签:#CVE-2023
GitHub
GitHub - thomas-osgood/CVE-2023-27163: Golang PoC for CVE-2023-27163 Mailtrail Exploit
Golang PoC for CVE-2023-27163 Mailtrail Exploit. Contribute to thomas-osgood/CVE-2023-27163 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF)
URL:https://github.com/0xFTW/CVE-2023-27163
标签:#CVE-2023
更新了:CVE-2023
描述:CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF)
URL:https://github.com/0xFTW/CVE-2023-27163
标签:#CVE-2023
GitHub
GitHub - cowsecurity/CVE-2023-27163: CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF)
CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF) - cowsecurity/CVE-2023-27163
😁1
GitHub监控消息提醒!!!
更新了:代码注入
描述:实现 Go 语言装饰器功能的编译链工具。它可以让 Go 语言使用简单的注释注解来装饰函数方法,完成样板代码注入,改变函数行为,就像其他语言的装饰器一样的体验!(比如 Python)
URL:https://github.com/dengsgo/go-decorator
标签:#代码注入
更新了:代码注入
描述:实现 Go 语言装饰器功能的编译链工具。它可以让 Go 语言使用简单的注释注解来装饰函数方法,完成样板代码注入,改变函数行为,就像其他语言的装饰器一样的体验!(比如 Python)
URL:https://github.com/dengsgo/go-decorator
标签:#代码注入
GitHub
GitHub - dengsgo/go-decorator: 让 Go 便捷使用装饰器的工具,装饰器能够切面 (AOP)、代理 (Proxy) 任意的函数和方法,提供观察和控制函数的能力。go-decorator is a tool that allows…
让 Go 便捷使用装饰器的工具,装饰器能够切面 (AOP)、代理 (Proxy) 任意的函数和方法,提供观察和控制函数的能力。go-decorator is a tool that allows Go to easily use decorators. The decorator can slice aspect (AOP) and proxy any function and method...
GitHub监控消息提醒!!!
更新了:Red Team
描述:All things LLM Security & Red Teaming Generative AI
URL:https://github.com/xsankar/Awesome-LLMSec
标签:#Red Team
更新了:Red Team
描述:All things LLM Security & Red Teaming Generative AI
URL:https://github.com/xsankar/Awesome-LLMSec
标签:#Red Team
GitHub
GitHub - xsankar/Awesome-LLMSec: All things LLM Security & Red Teaming Generative AI
All things LLM Security & Red Teaming Generative AI - GitHub - xsankar/Awesome-LLMSec: All things LLM Security & Red Teaming Generative AI
GitHub监控消息提醒!!!
更新了:bypass av
描述:Simple powershell reverse shell that bypass av
URL:https://github.com/50CENTTools/Blank-Grabber-Password-2020
标签:#bypass av
更新了:bypass av
描述:Simple powershell reverse shell that bypass av
URL:https://github.com/50CENTTools/Blank-Grabber-Password-2020
标签:#bypass av
GitHub
GitHub - 50CENTTools/Blank-Grabber-Password-2020: • GUI Builder. • UAC Bypass. • Custom Icon. • Runs On Startup. • Disables Windows…
• GUI Builder. • UAC Bypass. • Custom Icon. • Runs On Startup. • Disables Windows Defender. • Anti-VM. • Blocks AV-Related Sites. • Melt Stub. • Fake Error. • EXE Binder. • File Pumper. • Obfuscate...
GitHub监控消息提醒!!!
更新了:Red Team
描述:My Red Team Notes, Notes from years ago and new notes.
URL:https://github.com/d4rpell/My-Red-Team-Notes
标签:#Red Team
更新了:Red Team
描述:My Red Team Notes, Notes from years ago and new notes.
URL:https://github.com/d4rpell/My-Red-Team-Notes
标签:#Red Team
GitHub
GitHub - d4rpell/My-Red-Team-Notes: My Red Team Notes, Notes from years ago and new notes.
My Red Team Notes, Notes from years ago and new notes. - d4rpell/My-Red-Team-Notes
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Proof of concept for CVE-2023-40294 and CVE-2023-40295
URL:https://github.com/Halcy0nic/CVE-2023-40294-and-CVE-2023-40295
标签:#CVE-2023
更新了:CVE-2023
描述:Proof of concept for CVE-2023-40294 and CVE-2023-40295
URL:https://github.com/Halcy0nic/CVE-2023-40294-and-CVE-2023-40295
标签:#CVE-2023
GitHub
GitHub - Halcy0nic/CVE-2023-40294-and-CVE-2023-40295: Proof of concept for CVE-2023-40294 and CVE-2023-40295
Proof of concept for CVE-2023-40294 and CVE-2023-40295 - GitHub - Halcy0nic/CVE-2023-40294-and-CVE-2023-40295: Proof of concept for CVE-2023-40294 and CVE-2023-40295
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Proof of Concept for CVE-2023-40296
URL:https://github.com/Halcy0nic/CVE-2023-40296
标签:#CVE-2023
更新了:CVE-2023
描述:Proof of Concept for CVE-2023-40296
URL:https://github.com/Halcy0nic/CVE-2023-40296
标签:#CVE-2023
GitHub
GitHub - Halcy0nic/CVE-2023-40296: Proof of Concept for CVE-2023-40296
Proof of Concept for CVE-2023-40296. Contribute to Halcy0nic/CVE-2023-40296 development by creating an account on GitHub.
❤1👍1