GitHub监控消息提醒!!!
更新了:CVE-2023
描述:WAGO Remote Exploit Tool for CVE-2023-1698
URL:https://github.com/Chocapikk/CVE-2023-1698
标签:#CVE-2023
更新了:CVE-2023
描述:WAGO Remote Exploit Tool for CVE-2023-1698
URL:https://github.com/Chocapikk/CVE-2023-1698
标签:#CVE-2023
GitHub
GitHub - Chocapikk/CVE-2023-1698: WAGO Remote Exploit Tool for CVE-2023-1698
WAGO Remote Exploit Tool for CVE-2023-1698. Contribute to Chocapikk/CVE-2023-1698 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞验证
描述:cnvd-2022-76275 DSS逻辑漏洞验证脚本ps:顺手写的,师傅们可以进行自己优化
URL:https://github.com/iamhesy/cnvd-2022-76275
标签:#漏洞验证
更新了:漏洞验证
描述:cnvd-2022-76275 DSS逻辑漏洞验证脚本ps:顺手写的,师傅们可以进行自己优化
URL:https://github.com/iamhesy/cnvd-2022-76275
标签:#漏洞验证
GitHub
GitHub - iamhesy/cnvd-2022-76275: cnvd-2022-76275 DSS逻辑漏洞验证脚本ps:顺手写的,师傅们可以进行自己优化
cnvd-2022-76275 DSS逻辑漏洞验证脚本ps:顺手写的,师傅们可以进行自己优化. Contribute to iamhesy/cnvd-2022-76275 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Python Pentest Tools For Red Team Ops
URL:https://github.com/r0x000000000033/Python-Pentest-Tools
标签:#Red Team
更新了:Red Team
描述:Python Pentest Tools For Red Team Ops
URL:https://github.com/r0x000000000033/Python-Pentest-Tools
标签:#Red Team
GitHub
GitHub - r0x000000000033/Python-Pentest-Tools: Python Pentest Tools For Red Team Ops
Python Pentest Tools For Red Team Ops . Contribute to r0x000000000033/Python-Pentest-Tools development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞复现
描述: 智能合约漏洞案例,NeverFall 漏洞复现
URL:https://github.com/Not-So-Smart-Contract/20230917-111436-165
标签:#漏洞复现
更新了:漏洞复现
描述: 智能合约漏洞案例,NeverFall 漏洞复现
URL:https://github.com/Not-So-Smart-Contract/20230917-111436-165
标签:#漏洞复现
GitHub
GitHub - Not-So-Smart-Contract/20230917-111436-165: 智能合约漏洞案例,NeverFall 漏洞复现
智能合约漏洞案例,NeverFall 漏洞复现. Contribute to Not-So-Smart-Contract/20230917-111436-165 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:Sign-Sacker(签名掠夺者):一款数字签名复制器,可将其他官方exe中数字签名,图标,详细信息复制到没有签名的exe中,作为免杀,权限维持,伪装的一种小手段。
URL:https://github.com/langsasec/Sign-Sacker
标签:#免杀
更新了:免杀
描述:Sign-Sacker(签名掠夺者):一款数字签名复制器,可将其他官方exe中数字签名,图标,详细信息复制到没有签名的exe中,作为免杀,权限维持,伪装的一种小手段。
URL:https://github.com/langsasec/Sign-Sacker
标签:#免杀
GitHub
GitHub - langsasec/Sign-Sacker: Sign-Sacker(签名掠夺者):一款数字签名复制器,可将其他官方exe中数字签名,图标,详细信息复制到没有签名的exe中,作为免杀,权限维持,伪装的一种小手段。
Sign-Sacker(签名掠夺者):一款数字签名复制器,可将其他官方exe中数字签名,图标,详细信息复制到没有签名的exe中,作为免杀,权限维持,伪装的一种小手段。 - langsasec/Sign-Sacker
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0
URL:https://github.com/luanoliveira350/exploits
标签:#CVE-2023
更新了:CVE-2023
描述:GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0
URL:https://github.com/luanoliveira350/exploits
标签:#CVE-2023
GitHub
GitHub - luanoliveira350/GameOverlayFS: GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu…
GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0 - GitHub - luanoliveira350/GameOverlayFS: GameoverlayFS (CVE-2023-2640 and CVE-2023-326...
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0
URL:https://github.com/luanoliveira350/GameOverlayFS
标签:#CVE-2023
更新了:CVE-2023
描述:GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0
URL:https://github.com/luanoliveira350/GameOverlayFS
标签:#CVE-2023
GitHub
GitHub - luanoliveira350/GameOverlayFS: GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu…
GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0 - luanoliveira350/GameOverlayFS
GitHub监控消息提醒!!!
更新了:免杀
描述:nim语言编译的免杀木马,可上线,绕过360,windows自带病毒扫描工具
URL:https://github.com/nian312/nim
标签:#免杀
更新了:免杀
描述:nim语言编译的免杀木马,可上线,绕过360,windows自带病毒扫描工具
URL:https://github.com/nian312/nim
标签:#免杀
GitHub
GitHub - nian312/nim: nim语言编译的免杀木马,可上线,绕过360,windows自带病毒扫描工具
nim语言编译的免杀木马,可上线,绕过360,windows自带病毒扫描工具. Contribute to nian312/nim development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Collection of self-made Red Team tools that have come in handy
URL:https://github.com/RCStep/RedTeam_Tools_n_Stuff
标签:#Red Team
更新了:Red Team
描述:Collection of self-made Red Team tools that have come in handy
URL:https://github.com/RCStep/RedTeam_Tools_n_Stuff
标签:#Red Team
GitHub
GitHub - RCStep/RedTeam_Tools_n_Stuff: Collection of self-made Red Team tools that have come in handy
Collection of self-made Red Team tools that have come in handy - GitHub - RCStep/RedTeam_Tools_n_Stuff: Collection of self-made Red Team tools that have come in handy
GitHub监控消息提醒!!!
更新了:Red Team
描述:Official repo for GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts
URL:https://github.com/sherdencooper/GPTFuzz
标签:#Red Team
更新了:Red Team
描述:Official repo for GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts
URL:https://github.com/sherdencooper/GPTFuzz
标签:#Red Team
GitHub
GitHub - sherdencooper/GPTFuzz: Official repo for GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts
Official repo for GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts - sherdencooper/GPTFuzz
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation
URL:https://github.com/im-hanzou/MSAPer
标签:#CVE-2023
更新了:CVE-2023
描述:Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation
URL:https://github.com/im-hanzou/MSAPer
标签:#CVE-2023
GitHub
GitHub - im-hanzou/MSAPer: Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated…
Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload) - im-hanzou/MSAPer
GitHub监控消息提醒!!!
更新了:CVE-2023
描述:exp4CVE-2023-36319
URL:https://github.com/Lowalu/CVE-2023-36319
标签:#CVE-2023
更新了:CVE-2023
描述:exp4CVE-2023-36319
URL:https://github.com/Lowalu/CVE-2023-36319
标签:#CVE-2023
GitHub
GitHub - Lowalu/CVE-2023-36319: exp4CVE-2023-36319
exp4CVE-2023-36319. Contribute to Lowalu/CVE-2023-36319 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:可以复制excal文件内容,然后生成一个新文档。用于绕过加密软件,生成没打开过的excal文档。
URL:https://github.com/ZzzHe2333/copyexcal
标签:#绕过
更新了:绕过
描述:可以复制excal文件内容,然后生成一个新文档。用于绕过加密软件,生成没打开过的excal文档。
URL:https://github.com/ZzzHe2333/copyexcal
标签:#绕过
GitHub
GitHub - ZzzHe2333/copyexcal: 可以复制excal文件内容,然后生成一个新文档。用于绕过加密软件,生成没打开过的excal文档。
可以复制excal文件内容,然后生成一个新文档。用于绕过加密软件,生成没打开过的excal文档。. Contribute to ZzzHe2333/copyexcal development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Repository for archiving Cobalt Strike configuration
URL:https://github.com/Cobalt-Strike/teamserver-prop
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Repository for archiving Cobalt Strike configuration
URL:https://github.com/Cobalt-Strike/teamserver-prop
标签:#Cobalt Strike
GitHub
GitHub - Cobalt-Strike/teamserver-prop: TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to…
TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot and keylog callback data, which allows you to tweak the fix...
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:弱口令检测、 漏洞扫描、端口扫描(协议识别,组件识别)、web目录扫描、子域名扫描、等保模拟定级、自动化运维、等保工具(网络安全等级保护现场测评工具)内置3级等保核查命令、基线核查工具
URL:https://github.com/selinuxG/Golin
标签:#漏洞检测
更新了:漏洞检测
描述:弱口令检测、 漏洞扫描、端口扫描(协议识别,组件识别)、web目录扫描、子域名扫描、等保模拟定级、自动化运维、等保工具(网络安全等级保护现场测评工具)内置3级等保核查命令、基线核查工具
URL:https://github.com/selinuxG/Golin
标签:#漏洞检测
GitHub
GitHub - selinuxG/Golin: 弱口令检测、 漏洞扫描、端口扫描(协议识别,组件识别)、web目录扫描、等保工具(网络安全等级保护现场测评工具)内置3级等保核查命令、基线核查工具、键盘记录器
弱口令检测、 漏洞扫描、端口扫描(协议识别,组件识别)、web目录扫描、等保工具(网络安全等级保护现场测评工具)内置3级等保核查命令、基线核查工具、键盘记录器 - selinuxG/Golin