GitHub监控消息提醒!!!
更新了:CVE-2024
描述:With this script you can exploit the CVE-2024-24590
URL:https://github.com/sviim/ClearML-CVE-2024-24590
标签:#CVE-2024
更新了:CVE-2024
描述:With this script you can exploit the CVE-2024-24590
URL:https://github.com/sviim/ClearML-CVE-2024-24590
标签:#CVE-2024
GitHub
GitHub - sviim/ClearML-CVE-2024-24590-RCE: With this script you can exploit the CVE-2024-24590
With this script you can exploit the CVE-2024-24590 - sviim/ClearML-CVE-2024-24590-RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-20666 vulnerability Solution patch failures in the Windows Recovery Environment (WinRE).
URL:https://github.com/invaderslabs/CVE-2024-20666
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-20666 vulnerability Solution patch failures in the Windows Recovery Environment (WinRE).
URL:https://github.com/invaderslabs/CVE-2024-20666
标签:#CVE-2024
GitHub
GitHub - invaderslabs/CVE-2024-20666: CVE-2024-20666 vulnerability Solution patch failures in the Windows Recovery Environment…
CVE-2024-20666 vulnerability Solution patch failures in the Windows Recovery Environment (WinRE). - invaderslabs/CVE-2024-20666
GitHub监控消息提醒!!!
更新了:RCE
描述:A PoC exploit for CVE-2020-13945 - Apache APISIX Remote Code Execution (RCE)
URL:https://github.com/K3ysTr0K3R/CVE-2020-13945-EXPLOIT
标签:#RCE
更新了:RCE
描述:A PoC exploit for CVE-2020-13945 - Apache APISIX Remote Code Execution (RCE)
URL:https://github.com/K3ysTr0K3R/CVE-2020-13945-EXPLOIT
标签:#RCE
GitHub
GitHub - K3ysTr0K3R/CVE-2020-13945-EXPLOIT: A PoC exploit for CVE-2020-13945 - Apache APISIX Remote Code Execution (RCE)
A PoC exploit for CVE-2020-13945 - Apache APISIX Remote Code Execution (RCE) - K3ysTr0K3R/CVE-2020-13945-EXPLOIT
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for CVE-2024-5633
URL:https://github.com/Adikso/CVE-2024-5633
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for CVE-2024-5633
URL:https://github.com/Adikso/CVE-2024-5633
标签:#CVE-2024
GitHub
GitHub - Adikso/CVE-2024-5633: PoC for CVE-2024-5633
PoC for CVE-2024-5633. Contribute to Adikso/CVE-2024-5633 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-6694 - WP Mail SMTP < SMTP Password Exposure (Exploiter)
URL:https://github.com/codeb0ss/CVE-2024-6694-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-6694 - WP Mail SMTP < SMTP Password Exposure (Exploiter)
URL:https://github.com/codeb0ss/CVE-2024-6694-PoC
标签:#CVE-2024
GitHub
GitHub - codeb0ss/CVE-2024-6694-PoC: CVE-2024-6694 - WP Mail SMTP < SMTP Password Exposure (Exploiter)
CVE-2024-6694 - WP Mail SMTP < SMTP Password Exposure (Exploiter) - codeb0ss/CVE-2024-6694-PoC
GitHub监控消息提醒!!!
更新了:RCE
描述:Automated script in the creation of php and zip file for upload, this script is based on Pluck Cms 4.7.18 RCE.
URL:https://github.com/b0ySie7e/Pluck_Cms_4.7.18_RCE_Exploit
标签:#RCE
更新了:RCE
描述:Automated script in the creation of php and zip file for upload, this script is based on Pluck Cms 4.7.18 RCE.
URL:https://github.com/b0ySie7e/Pluck_Cms_4.7.18_RCE_Exploit
标签:#RCE
GitHub
GitHub - b0ySie7e/Pluck_Cms_4.7.18_RCE_Exploit: Automated script in the creation of php and zip file for upload, this script is…
Automated script in the creation of php and zip file for upload, this script is based on Pluck Cms 4.7.18 RCE. - b0ySie7e/Pluck_Cms_4.7.18_RCE_Exploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Hello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized as critical.
URL:https://github.com/H3KEY/CVE-2024-24919
标签:#CVE-2024
更新了:CVE-2024
描述:Hello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized as critical.
URL:https://github.com/H3KEY/CVE-2024-24919
标签:#CVE-2024
GitHub
GitHub - H3KEY/CVE-2024-24919: Hello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized…
Hello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized as critical. - H3KEY/CVE-2024-24919
GitHub监控消息提醒!!!
更新了:RCE
描述:C++ rewrite of PPPwn (PlayStation 4 PPPoE RCE) with steps to run from Mac M series
URL:https://github.com/soubhikRoy/PPPwn_cpp_sr
标签:#RCE
更新了:RCE
描述:C++ rewrite of PPPwn (PlayStation 4 PPPoE RCE) with steps to run from Mac M series
URL:https://github.com/soubhikRoy/PPPwn_cpp_sr
标签:#RCE
GitHub
GitHub - soubhikRoy/PPPwn_cpp_sr: C++ rewrite of PPPwn (PlayStation 4 PPPoE RCE) with steps to run from Mac M series
C++ rewrite of PPPwn (PlayStation 4 PPPoE RCE) with steps to run from Mac M series - soubhikRoy/PPPwn_cpp_sr
GitHub监控消息提醒!!!
更新了:反序列化
描述:参照 golang 标准库 net/rpc实现的一个小型的rpc框架,实现了服务端以及支持并发的客户端,并且支持选择不同的序列化与反序列化方式;为了防止服务挂死,在其中一些关键部分添加了超时处理机制;支持 TCP、Unix、HTTP 等多种传输协议
URL:https://github.com/Scare-Gift/go-rpc
标签:#反序列化
更新了:反序列化
描述:参照 golang 标准库 net/rpc实现的一个小型的rpc框架,实现了服务端以及支持并发的客户端,并且支持选择不同的序列化与反序列化方式;为了防止服务挂死,在其中一些关键部分添加了超时处理机制;支持 TCP、Unix、HTTP 等多种传输协议
URL:https://github.com/Scare-Gift/go-rpc
标签:#反序列化
GitHub
GitHub - Scare-Gift/go-rpc: 参照 golang 标准库 net/rpc实现的一个小型的rpc框架,实现了服务端以及支持并发的客户端,并且支持选择不同的序列化与反序列化方式;为了防止服务挂死,在其中一些关键部分添加了超时处理机制;支持…
参照 golang 标准库 net/rpc实现的一个小型的rpc框架,实现了服务端以及支持并发的客户端,并且支持选择不同的序列化与反序列化方式;为了防止服务挂死,在其中一些关键部分添加了超时处理机制;支持 TCP、Unix、HTTP 等多种传输协议 - Scare-Gift/go-rpc
GitHub监控消息提醒!!!
更新了:蓝队
描述:monkey app - 在Mac状态栏显示蓝队吗喽们的下班倒计时
URL:https://github.com/Scorcsoft/MonkeyApp
标签:#蓝队
更新了:蓝队
描述:monkey app - 在Mac状态栏显示蓝队吗喽们的下班倒计时
URL:https://github.com/Scorcsoft/MonkeyApp
标签:#蓝队
GitHub
GitHub - Scorcsoft/MonkeyApp: monkey app - 在Mac状态栏显示蓝队吗喽们的下班倒计时
monkey app - 在Mac状态栏显示蓝队吗喽们的下班倒计时. Contribute to Scorcsoft/MonkeyApp development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:Red Team
描述:Personal Red Teaming tools
URL:https://github.com/RidgeHack/RedTeamTools
标签:#Red Team
更新了:Red Team
描述:Personal Red Teaming tools
URL:https://github.com/RidgeHack/RedTeamTools
标签:#Red Team
GitHub监控消息提醒!!!
更新了:RCE
描述:Textpattern version 4.9.0 is vulnerable to Remote Code Execution (RCE) due to the file upload functionality allowing unrestricted PHP file uploads, potentially leading to remote code execution.
URL:https://github.com/patrickdeanramos/TextPattern-CMS-4.9.0-dev-Authenticated-Remote-Command-Execution-RCE-Through-File-Upload
标签:#RCE
更新了:RCE
描述:Textpattern version 4.9.0 is vulnerable to Remote Code Execution (RCE) due to the file upload functionality allowing unrestricted PHP file uploads, potentially leading to remote code execution.
URL:https://github.com/patrickdeanramos/TextPattern-CMS-4.9.0-dev-Authenticated-Remote-Command-Execution-RCE-Through-File-Upload
标签:#RCE
GitHub
GitHub - patrickdeanramos/TextPattern-CMS-4.9.0-dev-Authenticated-Remote-Command-Execution-RCE-Through-File-Upload: Textpattern…
Textpattern version 4.9.0 is vulnerable to Remote Code Execution (RCE) due to the file upload functionality allowing unrestricted PHP file uploads, potentially leading to remote code execution. - ...
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A Go implementation of Cobalt Strike style BOF/COFF loaders.
URL:https://github.com/praetorian-inc/goffloader
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:A Go implementation of Cobalt Strike style BOF/COFF loaders.
URL:https://github.com/praetorian-inc/goffloader
标签:#Cobalt Strike
GitHub
GitHub - praetorian-inc/goffloader: A Go implementation of Cobalt Strike style BOF/COFF loaders.
A Go implementation of Cobalt Strike style BOF/COFF loaders. - praetorian-inc/goffloader
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:GNU IFUNC is the real culprit behind CVE-2024-3094
URL:https://github.com/higorcamposs/zabbix-security-advisories-cve-database
标签:#CVE-2024
更新了:CVE-2024
描述:GNU IFUNC is the real culprit behind CVE-2024-3094
URL:https://github.com/higorcamposs/zabbix-security-advisories-cve-database
标签:#CVE-2024
GitHub
GitHub - higorcamposs/zabbix-security-advisories-cve-database: This template monitors active security advisories and CVEs in the…
This template monitors active security advisories and CVEs in the Zabbix environment. It captures the latest security advisories and CVE information to generate the same view in Zabbix, ensuring c...
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:This project is about how we can bypass AntiVirus by using Obfuscated PowerShell Scripts
URL:https://github.com/hai2036/Bypassing-AntiVirus-using-Obfuscated-PowerShell-Scripts
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:This project is about how we can bypass AntiVirus by using Obfuscated PowerShell Scripts
URL:https://github.com/hai2036/Bypassing-AntiVirus-using-Obfuscated-PowerShell-Scripts
标签:#bypass AntiVirus
GitHub
GitHub - hai2036/Bypassing-AntiVirus-using-Obfuscated-PowerShell-Scripts: This project is about how we can bypass AntiVirus by…
This project is about how we can bypass AntiVirus by using Obfuscated PowerShell Scripts - hai2036/Bypassing-AntiVirus-using-Obfuscated-PowerShell-Scripts
GitHub监控消息提醒!!!
更新了:应急响应
描述:Courier 信使,自用应急响应信息收集脚本,便于快速进行信息收集、定位攻击信息。
URL:https://github.com/Funsiooo/Courier
标签:#应急响应
更新了:应急响应
描述:Courier 信使,自用应急响应信息收集脚本,便于快速进行信息收集、定位攻击信息。
URL:https://github.com/Funsiooo/Courier
标签:#应急响应
GitHub
GitHub - Funsiooo/Courier: Courier 信使,自用应急响应信息收集脚本,便于快速进行信息收集、定位攻击信息。
Courier 信使,自用应急响应信息收集脚本,便于快速进行信息收集、定位攻击信息。. Contribute to Funsiooo/Courier development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack
URL:https://github.com/d0rb/CVE-2024-41107
标签:#CVE-2024
更新了:CVE-2024
描述:This repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack
URL:https://github.com/d0rb/CVE-2024-41107
标签:#CVE-2024
GitHub
GitHub - d0rb/CVE-2024-41107: This repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache…
This repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack - d0rb/CVE-2024-41107