GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4295 Email Subscribers by Icegram Express <= 5.7.20 - Unauthenticated SQL Injection via hash
URL:https://github.com/truonghuuphuc/CVE-2024-4295-Poc
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4295 Email Subscribers by Icegram Express <= 5.7.20 - Unauthenticated SQL Injection via hash
URL:https://github.com/truonghuuphuc/CVE-2024-4295-Poc
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:反序列化
描述:Shiro反序列化检测利用工具
URL:https://github.com/Serendipity-Lucky/Shiro-exp
标签:#反序列化
更新了:反序列化
描述:Shiro反序列化检测利用工具
URL:https://github.com/Serendipity-Lucky/Shiro-exp
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4956 Python exploitation utility
URL:https://github.com/fin3ss3g0d/CVE-2024-4956
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4956 Python exploitation utility
URL:https://github.com/fin3ss3g0d/CVE-2024-4956
标签:#CVE-2024
GitHub
GitHub - fin3ss3g0d/CVE-2024-4956: CVE-2024-4956 Python exploitation utility
CVE-2024-4956 Python exploitation utility. Contribute to fin3ss3g0d/CVE-2024-4956 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4956 Python exploitation utility
URL:https://github.com/un9nplayer/CVE-2024-24919
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4956 Python exploitation utility
URL:https://github.com/un9nplayer/CVE-2024-24919
标签:#CVE-2024
GitHub
GitHub - un9nplayer/CVE-2024-24919: This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability…
This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-...
👍想赚点小钱的哥们,可以白嫖一下,我是挺看好TG生态的,毕竟用户量太大了,之前电报官方发的币NOT,很多人只是每天签到一下,最后搞了几千U,什么项目都是搞得越早越好!
推荐一些类似 Not 点点点的电报小游戏
Ton 官方关注 0撸
➡️ @BlumCryptoBot
➡️ @hamster_kombat_bot
(不是广告)
每天签到一下,玩一下小游戏,坚持下去,赚点小钱,反正玩电报也是玩,不如赚点外快!
Ps: 还不知道ton是啥且感兴趣的,可以进总群交流
推荐一些类似 Not 点点点的电报小游戏
Ton 官方关注 0撸
➡️ @BlumCryptoBot
➡️ @hamster_kombat_bot
(不是广告)
每天签到一下,玩一下小游戏,坚持下去,赚点小钱,反正玩电报也是玩,不如赚点外快!
Ps: 还不知道ton是啥且感兴趣的,可以进总群交流
Telegram
Blum
Trade, connect, grow and… farm Blum Points! Made by @blumcrypto team 🌸
👎2👍1
🌈Github红队资源监控✨ pinned «👍想赚点小钱的哥们,可以白嫖一下,我是挺看好TG生态的,毕竟用户量太大了,之前电报官方发的币NOT,很多人只是每天签到一下,最后搞了几千U,什么项目都是搞得越早越好! 推荐一些类似 Not 点点点的电报小游戏 Ton 官方关注 0撸 ➡️ @BlumCryptoBot ➡️ @hamster_kombat_bot (不是广告) 每天签到一下,玩一下小游戏,坚持下去,赚点小钱,反正玩电报也是玩,不如赚点外快! Ps: 还不知道ton是啥且感兴趣的,可以进总群交流»
GitHub监控消息提醒!!!
更新了:内存马
描述:Godzilla插件|内存马|Suo5内存代理|jmg for Godzilla
URL:https://github.com/1ucky7/jmg-for-Godzilla
标签:#内存马
更新了:内存马
描述:Godzilla插件|内存马|Suo5内存代理|jmg for Godzilla
URL:https://github.com/1ucky7/jmg-for-Godzilla
标签:#内存马
GitHub
GitHub - 1ucky7/jmg-for-Godzilla: Godzilla插件|内存马|Suo5内存代理|jmg for Godzilla
Godzilla插件|内存马|Suo5内存代理|jmg for Godzilla. Contribute to 1ucky7/jmg-for-Godzilla development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:越权
描述:瞎越是一款 Burp Suite 的安全插件,主要用于测试 Web 越权、未授权的网络安全漏洞。
URL:https://github.com/ethanwang9/xia_Yue
标签:#越权
更新了:越权
描述:瞎越是一款 Burp Suite 的安全插件,主要用于测试 Web 越权、未授权的网络安全漏洞。
URL:https://github.com/ethanwang9/xia_Yue
标签:#越权
GitHub
GitHub - ethanwang9/xia_Yue: 瞎越是一款 Burp Suite 的安全插件,主要用于测试 Web 越权、未授权的网络安全漏洞。
瞎越是一款 Burp Suite 的安全插件,主要用于测试 Web 越权、未授权的网络安全漏洞。. Contribute to ethanwang9/xia_Yue development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)
URL:https://github.com/sinsinology/CVE-2024-4358
标签:#RCE
更新了:RCE
描述:Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)
URL:https://github.com/sinsinology/CVE-2024-4358
标签:#RCE
GitHub
GitHub - sinsinology/CVE-2024-4358: Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)
Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) - sinsinology/CVE-2024-4358
GitHub监控消息提醒!!!
更新了:攻防
描述:存放有关javaAgent的用法示例代码及其在jrasp中的攻防应用
URL:https://github.com/justdoit-cai/javaAgent-learn
标签:#攻防
更新了:攻防
描述:存放有关javaAgent的用法示例代码及其在jrasp中的攻防应用
URL:https://github.com/justdoit-cai/javaAgent-learn
标签:#攻防
GitHub
GitHub - justdoit-cai/javaAgent-learn: 存放有关javaAgent的用法示例代码及其在jrasp中的攻防应用
存放有关javaAgent的用法示例代码及其在jrasp中的攻防应用. Contribute to justdoit-cai/javaAgent-learn development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A Simple Exploit Code(POC) to Automate CVE-2024–24919
URL:https://github.com/starlox0/CVE-2024-24919-POC
标签:#CVE-2024
更新了:CVE-2024
描述:A Simple Exploit Code(POC) to Automate CVE-2024–24919
URL:https://github.com/starlox0/CVE-2024-24919-POC
标签:#CVE-2024
GitHub
GitHub - starlox0/CVE-2024-24919-POC: A Simple Exploit Code(POC) to Automate CVE-2024–24919
A Simple Exploit Code(POC) to Automate CVE-2024–24919 - starlox0/CVE-2024-24919-POC
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/M4rced/-M4rced-M4rced-6-followers-8-following-Organizations-22023-UCO-DOO-AFD_validationSecurityPasswords
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/M4rced/-M4rced-M4rced-6-followers-8-following-Organizations-22023-UCO-DOO-AFD_validationSecurityPasswords
标签:#RCE
GitHub
GitHub - M4rced/AFD_validationSecurityPasswords: This repository hosts the construction of a deterministic finite automaton or…
This repository hosts the construction of a deterministic finite automaton or AFD, which is in fromato JSON. In addition to this is the python codification that allows us to visualize according to ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.
URL:https://github.com/ATDanny/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.
URL:https://github.com/ATDanny/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - TAM-K592/CVE-2024-4577: CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers…
CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters. - TAM-K592/CVE-2024-4577
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.
URL:https://github.com/TAM-K592/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.
URL:https://github.com/TAM-K592/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - TAM-K592/CVE-2024-4577: CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers…
CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters. - TAM-K592/CVE-2024-4577
GitHub监控消息提醒!!!
更新了:Red Team
描述:This repository contains AD Red Teaming Tools
URL:https://github.com/MustafaNafizDurukan/ADRedTeamingTools
标签:#Red Team
更新了:Red Team
描述:This repository contains AD Red Teaming Tools
URL:https://github.com/MustafaNafizDurukan/ADRedTeamingTools
标签:#Red Team
GitHub
GitHub - MustafaNafizDurukan/ADRedTeamingTools: This repository contains AD Red Teaming Tools
This repository contains AD Red Teaming Tools. Contribute to MustafaNafizDurukan/ADRedTeamingTools development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:攻防
描述:攻防演练过程中,我们通常会用浏览器访问一些资产,但很多未授权/敏感信息/越权隐匿在已访问接口过html、JS文件等,该插件能让我们发现未授权/敏感信息/越权/登陆接口等。
URL:https://github.com/AJCDN003/ajcloudserver
标签:#攻防
更新了:攻防
描述:攻防演练过程中,我们通常会用浏览器访问一些资产,但很多未授权/敏感信息/越权隐匿在已访问接口过html、JS文件等,该插件能让我们发现未授权/敏感信息/越权/登陆接口等。
URL:https://github.com/AJCDN003/ajcloudserver
标签:#攻防
GitHub
GitHub - AJCDN003/ajcloudserver: 🔤🔤🔤🔤🔤🔒最优安全计划:采用VPN+跳板机系统+工作服务器/工作VPS组合,提供顶级数据和网络安全保障。 🌐CDN服务:支持无限抗攻击、非绕美、本地抗和国内加速,免实名可测试,享受极速网络和强大防御。…
🔤🔤🔤🔤🔤🔒最优安全计划:采用VPN+跳板机系统+工作服务器/工作VPS组合,提供顶级数据和网络安全保障。 🌐CDN服务:支持无限抗攻击、非绕美、本地抗和国内加速,免实名可测试,享受极速网络和强大防御。 ☁️云服务器:提供香港、新加坡、美国云服务器,免实名可测试,轻松实现全球业务快速部署。 🌍国内免备案服务器:免实名不可测试,适合各类国内业务,无需备案即可快速上线。 🚀高防服务器:免...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC
URL:https://github.com/watchtowrlabs/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC
URL:https://github.com/watchtowrlabs/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - watchtowrlabs/CVE-2024-4577: PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC
PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC - watchtowrlabs/CVE-2024-4577
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4577
URL:https://github.com/ohhhh693/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4577
URL:https://github.com/ohhhh693/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - ohhhh693/CVE-2024-4577: CVE-2024-4577
CVE-2024-4577. Contribute to ohhhh693/CVE-2024-4577 development by creating an account on GitHub.