GitHub监控消息提醒!!!
更新了:CVE-2024
描述:BOF implementations of CVE-2024-26229 for Cobalt Strike and Brute Ratel
URL:https://github.com/Cerbersec/CVE-2024-26229-BOF
标签:#CVE-2024
更新了:CVE-2024
描述:BOF implementations of CVE-2024-26229 for Cobalt Strike and Brute Ratel
URL:https://github.com/Cerbersec/CVE-2024-26229-BOF
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation
URL:https://github.com/truonghuuphuc/CVE-2024-4898-Poc
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation
URL:https://github.com/truonghuuphuc/CVE-2024-4898-Poc
标签:#CVE-2024
GitHub
GitHub - truonghuuphuc/CVE-2024-4898-Poc: CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing…
CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:DRive a poc backdoor exploiting CVE-2024-26229 for privilege escalation and persistence
URL:https://github.com/0XJ175/DRive
标签:#CVE-2024
更新了:CVE-2024
描述:DRive a poc backdoor exploiting CVE-2024-26229 for privilege escalation and persistence
URL:https://github.com/0XJ175/DRive
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/pandahacker2763/CVE-2024-24590
标签:#CVE-2024
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/pandahacker2763/CVE-2024-24590
标签:#CVE-2024
GitHub
GitHub - DemonPandaz2763/CVE-2024-24590: Another CVE-2024-24590 poc
Another CVE-2024-24590 poc. Contribute to DemonPandaz2763/CVE-2024-24590 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/DemonPandaz2763/CVE-2024-24590
标签:#CVE-2024
更新了:CVE-2024
描述:Another CVE-2024-24590 poc
URL:https://github.com/DemonPandaz2763/CVE-2024-24590
标签:#CVE-2024
GitHub
GitHub - DemonPandaz2763/CVE-2024-24590: Another CVE-2024-24590 poc
Another CVE-2024-24590 poc. Contribute to DemonPandaz2763/CVE-2024-24590 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/-
标签:#绕过
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/-
标签:#绕过
GitHub
GitHub - simpkinstimothy84/FUD-Crypter-Windows-Defender: 折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。. Contribute to simpkinstimothy84/FUD-Crypter-Windows-Defender development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Generate a base64 encoded Pickle RCE payload
URL:https://github.com/0xAlmighty/Pickle-Payload-Generator
标签:#RCE
更新了:RCE
描述:Generate a base64 encoded Pickle RCE payload
URL:https://github.com/0xAlmighty/Pickle-Payload-Generator
标签:#RCE
GitHub
GitHub - 0xAlmighty/Pickle-Payload-Generator: Generate base64 encoded Pickle payload
Generate base64 encoded Pickle payload. Contribute to 0xAlmighty/Pickle-Payload-Generator development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/FUD-Crypter-Windows-Defender
标签:#绕过
更新了:绕过
描述:折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
URL:https://github.com/simpkinstimothy84/FUD-Crypter-Windows-Defender
标签:#绕过
GitHub
GitHub - simpkinstimothy84/FUD-Crypter-Windows-Defender: 折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。
折纸加密器,带有更新的可以绕过Windows Defender的存根 - 定期更新。. Contribute to simpkinstimothy84/FUD-Crypter-Windows-Defender development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-4484
标签:#CVE-2024
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-4484
标签:#CVE-2024
GitHub
GitHub - Abo5/CVE-2024-4484: This script uses HTTParty to detect stored cross-site scripting (XSS) vulnerabilities in WordPress…
This script uses HTTParty to detect stored cross-site scripting (XSS) vulnerabilities in WordPress sites using the xai_username parameter. It sends a payload to the specified URL and checks if the ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-27282
标签:#CVE-2024
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-27282
标签:#CVE-2024
GitHub
GitHub - Abo5/CVE-2024-27282: script to detect if the installed Ruby version on your system is vulnerable to CVE-2024-27282. You…
script to detect if the installed Ruby version on your system is vulnerable to CVE-2024-27282. You should read the description of the vulnerability for more details: https://www.ruby-lang.org/en/ne...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-31210
标签:#CVE-2024
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/Abo5/CVE-2024-31210
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Valve Press - CVE-2024-27956-RCE - SQL Injection
URL:https://github.com/TadashiJei/Valve-Press-CVE-2024-27956-RCE
标签:#CVE-2024
更新了:CVE-2024
描述:Valve Press - CVE-2024-27956-RCE - SQL Injection
URL:https://github.com/TadashiJei/Valve-Press-CVE-2024-27956-RCE
标签:#CVE-2024
GitHub
GitHub - TadashiJei/Valve-Press-CVE-2024-27956-RCE: Valve Press - CVE-2024-27956-RCE - SQL Injection
Valve Press - CVE-2024-27956-RCE - SQL Injection. Contribute to TadashiJei/Valve-Press-CVE-2024-27956-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)
URL:https://github.com/jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS
标签:#CVE-2024
更新了:CVE-2024
描述:Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)
URL:https://github.com/jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS
标签:#CVE-2024
GitHub
GitHub - jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS: Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)
Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692) - jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:使用python编写的php-cgi解析漏洞扫描器,大三课程设计作品
URL:https://github.com/ho2kin/PHP-CGI-Scanner
标签:#漏洞扫描
更新了:漏洞扫描
描述:使用python编写的php-cgi解析漏洞扫描器,大三课程设计作品
URL:https://github.com/ho2kin/PHP-CGI-Scanner
标签:#漏洞扫描
GitHub
GitHub - ho2kin/PHP-CGI-Scanner: 个人课程设计作品
个人课程设计作品. Contribute to ho2kin/PHP-CGI-Scanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:kubernetes container filebrowser and webshell
URL:https://github.com/busybox-org/kubefilebrowser
标签:#webshell
更新了:webshell
描述:kubernetes container filebrowser and webshell
URL:https://github.com/busybox-org/kubefilebrowser
标签:#webshell
GitHub
GitHub - busybox-org/kubefilebrowser: kubernetes container file browser. Is a simple web application that allows you to browse…
kubernetes container file browser. Is a simple web application that allows you to browse and edit files in a kubernetes container. - busybox-org/kubefilebrowser
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051)
URL:https://github.com/mrblackstar26/CVE-2024-37051
标签:#CVE-2024
更新了:CVE-2024
描述:Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051)
URL:https://github.com/mrblackstar26/CVE-2024-37051
标签:#CVE-2024
GitHub
GitHub - mrblackstar26/CVE-2024-37051: Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051)
Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051) - mrblackstar26/CVE-2024-37051
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel
URL:https://github.com/NVISOsecurity/CVE-2024-26229-BOF
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel
URL:https://github.com/NVISOsecurity/CVE-2024-26229-BOF
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855
URL:https://github.com/sinsinology/CVE-2024-29855
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855
URL:https://github.com/sinsinology/CVE-2024-29855
标签:#CVE-2024
GitHub
GitHub - sinsinology/CVE-2024-29855: PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855
PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855 - sinsinology/CVE-2024-29855