GitHub监控消息提醒!!!
更新了:Red Team
描述:Automation framework for exploring various Red Teaming Tools
URL:https://github.com/ameyavv/REDTeaming_Automation_Framework
标签:#Red Team
更新了:Red Team
描述:Automation framework for exploring various Red Teaming Tools
URL:https://github.com/ameyavv/REDTeaming_Automation_Framework
标签:#Red Team
GitHub监控消息提醒!!!
更新了:Red Team
描述:HarmBench: A Standardized Evaluation Framework for Automated Red Teaming and Robust Refusal
URL:https://github.com/centerforaisafety/HarmBench
标签:#Red Team
更新了:Red Team
描述:HarmBench: A Standardized Evaluation Framework for Automated Red Teaming and Robust Refusal
URL:https://github.com/centerforaisafety/HarmBench
标签:#Red Team
GitHub
GitHub - centerforaisafety/HarmBench: HarmBench: A Standardized Evaluation Framework for Automated Red Teaming and Robust Refusal
HarmBench: A Standardized Evaluation Framework for Automated Red Teaming and Robust Refusal - centerforaisafety/HarmBench
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4
URL:https://github.com/blackmagic2023/AnyDesk-7.0.15---Unquoted-Service-Path-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4
URL:https://github.com/blackmagic2023/AnyDesk-7.0.15---Unquoted-Service-Path-PoC
标签:#CVE-2024
GitHub
GitHub - blackmagic2023/AnyDesk-7.0.15---Unquoted-Service-Path-PoC: This script serves as a proof of concept (PoC) for the CVE…
This script serves as a proof of concept (PoC) for the CVE-2024-XXXX vulnerability in AnyDesk version 7.0.15. The vulnerability involves an unquoted service path, allowing an authorized but non-pri...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-24576 PoC for Nim Lang
URL:https://github.com/foxoman/CVE-2024-24576-PoC---Nim
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-24576 PoC for Nim Lang
URL:https://github.com/foxoman/CVE-2024-24576-PoC---Nim
标签:#CVE-2024
GitHub
GitHub - foxoman/CVE-2024-24576-PoC---Nim: CVE-2024-24576 PoC for Nim Lang
CVE-2024-24576 PoC for Nim Lang. Contribute to foxoman/CVE-2024-24576-PoC---Nim development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:护网
描述:由于作者比较懒,于是它就诞生了(可以叫他ip138的轮子),脚本可用于ip反查归属地+域名+可批量+查询本机公网ip,HW护网查归属溯源等
URL:https://github.com/1ighttack/getAns
标签:#护网
更新了:护网
描述:由于作者比较懒,于是它就诞生了(可以叫他ip138的轮子),脚本可用于ip反查归属地+域名+可批量+查询本机公网ip,HW护网查归属溯源等
URL:https://github.com/1ighttack/getAns
标签:#护网
GitHub
GitHub - 1ighttack/getAns: 由于作者比较懒,于是它就诞生了(可以叫他ip138的轮子),脚本可用于ip反查归属地+域名+可批量+查询本机公网ip,HW护网查归属溯源等
由于作者比较懒,于是它就诞生了(可以叫他ip138的轮子),脚本可用于ip反查归属地+域名+可批量+查询本机公网ip,HW护网查归属溯源等 - 1ighttack/getAns
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository contains RCE (Remote Code Execution) exploit targeting NDIS.sys .This exploit was developed By Known Oraganization and I Leak Them Out..
URL:https://github.com/AMEDFs/NDIS.sys
标签:#RCE
更新了:RCE
描述:This repository contains RCE (Remote Code Execution) exploit targeting NDIS.sys .This exploit was developed By Known Oraganization and I Leak Them Out..
URL:https://github.com/AMEDFs/NDIS.sys
标签:#RCE
👎1
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike Aggressor script create for RTO
URL:https://github.com/rashbx1/RTO_Aggressor_Script
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike Aggressor script create for RTO
URL:https://github.com/rashbx1/RTO_Aggressor_Script
标签:#Cobalt Strike
GitHub
GitHub - rashbx1/RTO_Aggressor_Script: Cobalt Strike Aggressor script create for RTO
Cobalt Strike Aggressor script create for RTO. Contribute to rashbx1/RTO_Aggressor_Script development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A helper script for consolidating Aggressor Script and Beacon Object File (BOF) repositories into a single CNA file for Cobalt Strike.
URL:https://github.com/sudonoodle/Aggressor-Aggregator
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:A helper script for consolidating Aggressor Script and Beacon Object File (BOF) repositories into a single CNA file for Cobalt Strike.
URL:https://github.com/sudonoodle/Aggressor-Aggregator
标签:#Cobalt Strike
GitHub
GitHub - sudonoodle/Aggressor-Aggregator: A helper script for consolidating Aggressor and BOF repositories into a single CNA for…
A helper script for consolidating Aggressor and BOF repositories into a single CNA for Cobalt Strike. - sudonoodle/Aggressor-Aggregator
GitHub监控消息提醒!!!
更新了:绕过
描述:绕过瑞数waf的动态验证机制,实现请求包重放,可针对不同网站使用。
URL:https://github.com/R0A1NG/Botgate_bypass
标签:#绕过
更新了:绕过
描述:绕过瑞数waf的动态验证机制,实现请求包重放,可针对不同网站使用。
URL:https://github.com/R0A1NG/Botgate_bypass
标签:#绕过
GitHub
GitHub - R0A1NG/Botgate_bypass: 绕过瑞数waf的动态验证机制,实现请求包重放,理论支持不同网站环境使用,如网页、小程序、APP等。
绕过瑞数waf的动态验证机制,实现请求包重放,理论支持不同网站环境使用,如网页、小程序、APP等。. Contribute to R0A1NG/Botgate_bypass development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:WebShell for Red Teams, just easily
URL:https://github.com/ebalo55/crabby
标签:#webshell
更新了:webshell
描述:WebShell for Red Teams, just easily
URL:https://github.com/ebalo55/crabby
标签:#webshell
GitHub
GitHub - ebalo55/crabby: WebShell for Red Teams, just easily
WebShell for Red Teams, just easily. Contribute to ebalo55/crabby development by creating an account on GitHub.
👎1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:OpenMetadata_RCE (CVE-2024-28255) Batch scan/exploit
URL:https://github.com/YongYe-Security/CVE-2024-28255
标签:#CVE-2024
更新了:CVE-2024
描述:OpenMetadata_RCE (CVE-2024-28255) Batch scan/exploit
URL:https://github.com/YongYe-Security/CVE-2024-28255
标签:#CVE-2024
GitHub
GitHub - YongYe-Security/CVE-2024-28255: OpenMetadata_RCE (CVE-2024-28255) Batch scan/exploit
OpenMetadata_RCE (CVE-2024-28255) Batch scan/exploit - YongYe-Security/CVE-2024-28255
GitHub监控消息提醒!!!
更新了:RCE
描述:Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan/exploit
URL:https://github.com/YongYe-Security/CVE-2024-29269
标签:#RCE
更新了:RCE
描述:Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan/exploit
URL:https://github.com/YongYe-Security/CVE-2024-29269
标签:#RCE
GitHub
GitHub - YongYe-Security/CVE-2024-29269: Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan/exploit
Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan/exploit - YongYe-Security/CVE-2024-29269
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Public exploit for CVE-2024-31777
URL:https://github.com/FreySolarEye/CVE-2024-31777
标签:#CVE-2024
更新了:CVE-2024
描述:Public exploit for CVE-2024-31777
URL:https://github.com/FreySolarEye/CVE-2024-31777
标签:#CVE-2024
GitHub
FreySolarEye/CVE-2024-31777
Public exploit for CVE-2024-31777. Contribute to FreySolarEye/CVE-2024-31777 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Public exploit for CVE-2024-31777
URL:https://github.com/FreySolarEye/Exploit-CVE-2024-31777
标签:#CVE-2024
更新了:CVE-2024
描述:Public exploit for CVE-2024-31777
URL:https://github.com/FreySolarEye/Exploit-CVE-2024-31777
标签:#CVE-2024
GitHub
GitHub - FreySolarEye/Exploit-CVE-2024-31777: Public exploit for CVE-2024-31777
Public exploit for CVE-2024-31777. Contribute to FreySolarEye/Exploit-CVE-2024-31777 development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/havebeenpwned/CVE-2024-3400-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/havebeenpwned/CVE-2024-3400-POC
标签:#CVE-2024
GitHub
GitHub - havebeenpwned/CVE-2024-3400-POC: CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software - havebeenpwned/CVE-2024-3400-POC
👎2
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/letsrockmee/CVE-2024-3400-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/letsrockmee/CVE-2024-3400-POC
标签:#CVE-2024
👎1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/hubabuba228/CVE-2024-3400-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/hubabuba228/CVE-2024-3400-POC
标签:#CVE-2024
👎1
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team Analysis of Man in the Middle Attacks Against SOC Tools
URL:https://github.com/loosehose/stride
标签:#Red Team
更新了:Red Team
描述:Red Team Analysis of Man in the Middle Attacks Against SOC Tools
URL:https://github.com/loosehose/stride
标签:#Red Team
GitHub
GitHub - loosehose/stride: Stride is an open-source tool that simplifies the process of setting up and managing red team infrastructure.…
Stride is an open-source tool that simplifies the process of setting up and managing red team infrastructure. It provides a user-friendly interface for quickly deploying and configuring various com...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/bigsclowns/CVE-2024-3400-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software
URL:https://github.com/bigsclowns/CVE-2024-3400-POC
标签:#CVE-2024
👎2