GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.
URL:https://github.com/Z3r0H0ur666/RCE-Hunter
标签:#RCE
更新了:RCE
描述:CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.
URL:https://github.com/Z3r0H0ur666/RCE-Hunter
标签:#RCE
GitHub
GitHub - Z3r0H0ur666/RCE-Hunter: RCE Hunter is a Python-based tool developed by NullC0d3 for automated testing of Remote Code Execution…
RCE Hunter is a Python-based tool developed by NullC0d3 for automated testing of Remote Code Execution (RCE) vulnerabilities. It supports multithreading, payload management, and includes open redir...
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.
URL:https://github.com/cc1a2b/PenHunter
标签:#RCE
更新了:RCE
描述:CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.
URL:https://github.com/cc1a2b/PenHunter
标签:#RCE
GitHub
GitHub - cc1a2b/PenHunter: Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security…
Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it automates the process of collecting subdomains and URLs and tes...
GitHub监控消息提醒!!!
更新了:RCE
描述:一款集成了H3C,致远,泛微,万户,帆软,海康威视,金蝶云星空,畅捷通,Struts等多个RCE漏洞利用工具
URL:https://github.com/stoneharry/RCEPatcher
标签:#RCE
更新了:RCE
描述:一款集成了H3C,致远,泛微,万户,帆软,海康威视,金蝶云星空,畅捷通,Struts等多个RCE漏洞利用工具
URL:https://github.com/stoneharry/RCEPatcher
标签:#RCE
GitHub
GitHub - stoneharry/RCEPatcher: In the 3.3.5a WoW client there is a Remote Code Exploit (RCE) that allows any private server owner…
In the 3.3.5a WoW client there is a Remote Code Exploit (RCE) that allows any private server owner to inject and run arbitrary code on your computer. This patcher will modify your WoW executable fi...
GitHub监控消息提醒!!!
更新了:bypass av
描述:一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
URL:https://github.com/skelegamerYT11/StealthShell-Win11-AV-Bypass-Digispark
标签:#bypass av
更新了:bypass av
描述:一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
URL:https://github.com/skelegamerYT11/StealthShell-Win11-AV-Bypass-Digispark
标签:#bypass av
GitHub
GitHub - skelegamerYT11/StealthShell-Win11-AV-Bypass-Digispark: StealthShell is an educational project demonstrating how to use…
StealthShell is an educational project demonstrating how to use a DigiSpark microcontroller to create a reverse shell that can bypass antivirus software on Windows 11. This project highlights the p...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:RCE through git recursive cloning.
URL:https://github.com/HexDoesRandomShit/CVE-2024-32002
标签:#CVE-2024
更新了:CVE-2024
描述:RCE through git recursive cloning.
URL:https://github.com/HexDoesRandomShit/CVE-2024-32002
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:信息收集
描述:Google Hack半自动化信息收集/PYTHON
URL:https://github.com/linyuexiyu/Google-Hack-
标签:#信息收集
更新了:信息收集
描述:Google Hack半自动化信息收集/PYTHON
URL:https://github.com/linyuexiyu/Google-Hack-
标签:#信息收集
GitHub
GitHub - linyuexiyu/Google-Hack-: Google Hack半自动化信息收集/PYTHON
Google Hack半自动化信息收集/PYTHON. Contribute to linyuexiyu/Google-Hack- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
URL:https://github.com/jerryy2577/jd_scripts
标签:#免杀
更新了:免杀
描述:一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
URL:https://github.com/jerryy2577/jd_scripts
标签:#免杀
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.
URL:https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.
URL:https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
标签:#CVE-2024
GitHub
GitHub - Marven11/CVE-2024-28397-js2py-Sandbox-Escape: CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.
CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction. - Marven11/CVE-2024-28397-js2py-Sandbox-Escape
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2023-4220 POC RCE
URL:https://github.com/insomnia-jacob/CVE-2023-4220
标签:#RCE
更新了:RCE
描述:CVE-2023-4220 POC RCE
URL:https://github.com/insomnia-jacob/CVE-2023-4220
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for CVE-2024-34144
URL:https://github.com/MXWXZ/CVE-2024-34144
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for CVE-2024-34144
URL:https://github.com/MXWXZ/CVE-2024-34144
标签:#CVE-2024
GitHub
GitHub - MXWXZ/CVE-2024-34144: PoC for CVE-2024-34144
PoC for CVE-2024-34144. Contribute to MXWXZ/CVE-2024-34144 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC to test CVE-2024-39929 against EXIM mail servers
URL:https://github.com/michael-david-fry/CVE-2024-39929
标签:#CVE-2024
更新了:CVE-2024
描述:POC to test CVE-2024-39929 against EXIM mail servers
URL:https://github.com/michael-david-fry/CVE-2024-39929
标签:#CVE-2024
GitHub
GitHub - michael-david-fry/CVE-2024-39929: POC to test CVE-2024-39929 against EXIM mail servers
POC to test CVE-2024-39929 against EXIM mail servers - michael-david-fry/CVE-2024-39929
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-21006 exp
URL:https://github.com/lightr3d/CVE-2024-21006_jar
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-21006 exp
URL:https://github.com/lightr3d/CVE-2024-21006_jar
标签:#CVE-2024
GitHub
GitHub - lightr3d/CVE-2024-21006_jar: CVE-2024-21006 exp
CVE-2024-21006 exp. Contribute to lightr3d/CVE-2024-21006_jar development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/etx-Arn/CVE-2024-34102-RCE
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/etx-Arn/CVE-2024-34102-RCE
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/suifei/fridare
标签:#绕过
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/suifei/fridare
标签:#绕过
GitHub
GitHub - suifei/fridare: 强大的 Frida 重打包工具,用于 iOS 和 Android。轻松修改 Frida 特征,增强隐蔽性,绕过检测。简化逆向工程和安全测试。Powerful Frida repackaging tool…
强大的 Frida 重打包工具,用于 iOS 和 Android。轻松修改 Frida 特征,增强隐蔽性,绕过检测。简化逆向工程和安全测试。Powerful Frida repackaging tool for iOS and Android. Easily modify Frida servers to enhance stealth and bypass detection. Strea...