GitHub监控消息提醒!!!
更新了:内存马
描述:Python内存马管理工具 Python MemShell
URL:https://github.com/orzchen/PyMemShell
标签:#内存马
更新了:内存马
描述:Python内存马管理工具 Python MemShell
URL:https://github.com/orzchen/PyMemShell
标签:#内存马
GitHub
GitHub - orzchen/PyMemShell: Python内存马管理工具 Python MemShell
Python内存马管理工具 Python MemShell. Contribute to orzchen/PyMemShell development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23692
URL:https://github.com/BBD-YZZ/CVE-2024-23692
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23692
URL:https://github.com/BBD-YZZ/CVE-2024-23692
标签:#CVE-2024
GitHub
GitHub - BBD-YZZ/CVE-2024-23692: CVE-2024-23692
CVE-2024-23692. Contribute to BBD-YZZ/CVE-2024-23692 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:弱口令检测、 漏洞扫描、端口扫描(协议识别,组件识别)、web目录扫描、等保模拟定级、自动化运维、等保工具(网络安全等级保护现场测评工具)内置3级等保核查命令、基线核查工具、键盘记录器
URL:https://github.com/Bear1009/VulDHGCN
标签:#漏洞检测
更新了:漏洞检测
描述:弱口令检测、 漏洞扫描、端口扫描(协议识别,组件识别)、web目录扫描、等保模拟定级、自动化运维、等保工具(网络安全等级保护现场测评工具)内置3级等保核查命令、基线核查工具、键盘记录器
URL:https://github.com/Bear1009/VulDHGCN
标签:#漏洞检测
GitHub
GitHub - Bear1009/VulDHGCN: 针对源代码漏洞检测领域中存在的挑战,特别是现有方法在代码图精准嵌入和捕获其复杂层次结构方面的不足,提出了一种创新的基于双曲图卷积神经网络(Hyperbolic Graph Convolutional…
针对源代码漏洞检测领域中存在的挑战,特别是现有方法在代码图精准嵌入和捕获其复杂层次结构方面的不足,提出了一种创新的基于双曲图卷积神经网络(Hyperbolic Graph Convolutional Neural Network)的切片级源代码漏洞检测方法,称为VulDHGCN。该方法融合了图卷积神经网络和双曲几何的强大表达能力,更全面地嵌入和保留了源代码的结构特征,有效降低了代码图嵌入过程...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/snyk-labs/pdfjs-vuln-demo
标签:#CVE-2024
更新了:CVE-2024
描述:This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367
URL:https://github.com/snyk-labs/pdfjs-vuln-demo
标签:#CVE-2024
GitHub
GitHub - snyk-labs/pdfjs-vuln-demo: This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability…
This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367 - snyk-labs/pdfjs-vuln-demo
GitHub监控消息提醒!!!
更新了:Red Team
描述:A ML Model That Predict The Percentage of Winning for Each Blue And Red Team in League of Legends
URL:https://github.com/1FarZ1/league-of-legends-win-predector
标签:#Red Team
更新了:Red Team
描述:A ML Model That Predict The Percentage of Winning for Each Blue And Red Team in League of Legends
URL:https://github.com/1FarZ1/league-of-legends-win-predector
标签:#Red Team
GitHub
GitHub - 1FarZ1/league-of-legends-win-predector: A ML Model That Predict The Percentage of Winning for Each Blue And Red Team in…
A ML Model That Predict The Percentage of Winning for Each Blue And Red Team in League of Legends - GitHub - 1FarZ1/league-of-legends-win-predector: A ML Model That Predict The Percentage of Winni...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4577 POC
URL:https://github.com/VictorShem/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4577 POC
URL:https://github.com/VictorShem/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - VictorShem/CVE-2024-4577: CVE-2024-4577 POC
CVE-2024-4577 POC. Contribute to VictorShem/CVE-2024-4577 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:simple and useful webshells wich you can use for challenge your firewall .
URL:https://github.com/awsox/403-bypass-webshell
标签:#webshell
更新了:webshell
描述:simple and useful webshells wich you can use for challenge your firewall .
URL:https://github.com/awsox/403-bypass-webshell
标签:#webshell
GitHub
GitHub - awsox/403-bypass-webshells: simple and useful webshells wich you can use for challenge your firewall .
simple and useful webshells wich you can use for challenge your firewall . - awsox/403-bypass-webshells
GitHub监控消息提醒!!!
更新了:渗透测试
描述:多人协同信息安全渗透测试报告编写/导出平台
URL:https://github.com/chengling-ing/SecReport
标签:#渗透测试
更新了:渗透测试
描述:多人协同信息安全渗透测试报告编写/导出平台
URL:https://github.com/chengling-ing/SecReport
标签:#渗透测试
GitHub
GitHub - chengling-ing/SecReport: 多人协同信息安全渗透测试报告编写/导出平台
多人协同信息安全渗透测试报告编写/导出平台. Contribute to chengling-ing/SecReport development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC for CVE-2024-37843. Craft CMS itm-based blind SQLi
URL:https://github.com/gsmith257-cyber/CVE-2024-37843-POC
标签:#CVE-2024
更新了:CVE-2024
描述:POC for CVE-2024-37843. Craft CMS itm-based blind SQLi
URL:https://github.com/gsmith257-cyber/CVE-2024-37843-POC
标签:#CVE-2024
GitHub
GitHub - gsmith257-cyber/CVE-2024-37843-POC: POC for CVE-2024-37843. Craft CMS time-based blind SQLi
POC for CVE-2024-37843. Craft CMS time-based blind SQLi - gsmith257-cyber/CVE-2024-37843-POC
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-23692 Exploit
URL:https://github.com/0x20c/CVE-2024-23692-EXP
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-23692 Exploit
URL:https://github.com/0x20c/CVE-2024-23692-EXP
标签:#CVE-2024
GitHub
GitHub - 0x20c/CVE-2024-23692-EXP: CVE-2024-23692 Exploit
CVE-2024-23692 Exploit. Contribute to 0x20c/CVE-2024-23692-EXP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely
URL:https://github.com/scs-labrat/android_autorooter
标签:#CVE-2024
更新了:CVE-2024
描述:Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely
URL:https://github.com/scs-labrat/android_autorooter
标签:#CVE-2024
GitHub
GitHub - scs-labrat/android_autorooter: Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability…
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely - scs-labrat/android_autorooter
GitHub监控消息提醒!!!
更新了:burp
描述:A burp plugin which allows you to extract strings from requests and responses using regex
URL:https://github.com/alastair1616/GrepExtractor
标签:#burp
更新了:burp
描述:A burp plugin which allows you to extract strings from requests and responses using regex
URL:https://github.com/alastair1616/GrepExtractor
标签:#burp
GitHub
GitHub - alastair1616/GrepExtractor: A burp plugin which allows you to extract strings from requests and responses using regex
A burp plugin which allows you to extract strings from requests and responses using regex - alastair1616/GrepExtractor
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13
URL:https://github.com/pl4int3xt/cve_2024_0044
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13
URL:https://github.com/pl4int3xt/cve_2024_0044
标签:#CVE-2024
GitHub
GitHub - 0xbinder/CVE-2024-0044: CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and…
CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 - 0xbinder/CVE-2024-0044
GitHub监控消息提醒!!!
更新了:信息收集
描述:密探渗透测试工具包含资产信息收集,子域名爆破,搜索语法,资产测绘(FOFA,Hunter,quake, ZoomEye),指纹识别,敏感信息采集,文件扫描、密码字典等功能
URL:https://github.com/codeTopcn/2442
标签:#信息收集
更新了:信息收集
描述:密探渗透测试工具包含资产信息收集,子域名爆破,搜索语法,资产测绘(FOFA,Hunter,quake, ZoomEye),指纹识别,敏感信息采集,文件扫描、密码字典等功能
URL:https://github.com/codeTopcn/2442
标签:#信息收集
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:本项目从智能合约数据集中搜集了178个存在漏洞的样本,并通过多种智能合约漏洞检测算法进行检验,制作成适用于大模型输入输出形式的训练数据集。
URL:https://github.com/wizonce9/Chinese-LLM-Training-Dataset-for-Smart-Contract-Vulnerability-Repair
标签:#漏洞检测
更新了:漏洞检测
描述:本项目从智能合约数据集中搜集了178个存在漏洞的样本,并通过多种智能合约漏洞检测算法进行检验,制作成适用于大模型输入输出形式的训练数据集。
URL:https://github.com/wizonce9/Chinese-LLM-Training-Dataset-for-Smart-Contract-Vulnerability-Repair
标签:#漏洞检测
GitHub
GitHub - wizonce9/Chinese-LLM-Training-Dataset-for-Smart-Contract-Vulnerability-Repair: This project collected 178 samples of vulnerable…
This project collected 178 samples of vulnerable smart contracts from various datasets and examined them using multiple smart contract vulnerability detection algorithms. The data has been formatte...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Only for windows 11. Check if you are protected via windows update against CVE-2024-30078 Windows Wi-Fi Driver Remote Code Execution Vulnerability
URL:https://github.com/nkontopoul/checkwifivulnerability
标签:#CVE-2024
更新了:CVE-2024
描述:Only for windows 11. Check if you are protected via windows update against CVE-2024-30078 Windows Wi-Fi Driver Remote Code Execution Vulnerability
URL:https://github.com/nkontopoul/checkwifivulnerability
标签:#CVE-2024