GitHub监控消息提醒!!!
更新了:RCE
描述:一款集成了H3C,致远,泛微,万户,帆软,海康威视,金蝶云星空,畅捷通,Struts等多个RCE漏洞利用工具
URL:https://github.com/stoneharry/RCEPatcher
标签:#RCE
更新了:RCE
描述:一款集成了H3C,致远,泛微,万户,帆软,海康威视,金蝶云星空,畅捷通,Struts等多个RCE漏洞利用工具
URL:https://github.com/stoneharry/RCEPatcher
标签:#RCE
GitHub
GitHub - stoneharry/RCEPatcher: In the 3.3.5a WoW client there is a Remote Code Exploit (RCE) that allows any private server owner…
In the 3.3.5a WoW client there is a Remote Code Exploit (RCE) that allows any private server owner to inject and run arbitrary code on your computer. This patcher will modify your WoW executable fi...
GitHub监控消息提醒!!!
更新了:bypass av
描述:一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
URL:https://github.com/skelegamerYT11/StealthShell-Win11-AV-Bypass-Digispark
标签:#bypass av
更新了:bypass av
描述:一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
URL:https://github.com/skelegamerYT11/StealthShell-Win11-AV-Bypass-Digispark
标签:#bypass av
GitHub
GitHub - skelegamerYT11/StealthShell-Win11-AV-Bypass-Digispark: StealthShell is an educational project demonstrating how to use…
StealthShell is an educational project demonstrating how to use a DigiSpark microcontroller to create a reverse shell that can bypass antivirus software on Windows 11. This project highlights the p...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:RCE through git recursive cloning.
URL:https://github.com/HexDoesRandomShit/CVE-2024-32002
标签:#CVE-2024
更新了:CVE-2024
描述:RCE through git recursive cloning.
URL:https://github.com/HexDoesRandomShit/CVE-2024-32002
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:信息收集
描述:Google Hack半自动化信息收集/PYTHON
URL:https://github.com/linyuexiyu/Google-Hack-
标签:#信息收集
更新了:信息收集
描述:Google Hack半自动化信息收集/PYTHON
URL:https://github.com/linyuexiyu/Google-Hack-
标签:#信息收集
GitHub
GitHub - linyuexiyu/Google-Hack-: Google Hack半自动化信息收集/PYTHON
Google Hack半自动化信息收集/PYTHON. Contribute to linyuexiyu/Google-Hack- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
URL:https://github.com/jerryy2577/jd_scripts
标签:#免杀
更新了:免杀
描述:一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
URL:https://github.com/jerryy2577/jd_scripts
标签:#免杀
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.
URL:https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.
URL:https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
标签:#CVE-2024
GitHub
GitHub - Marven11/CVE-2024-28397-js2py-Sandbox-Escape: CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.
CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction. - Marven11/CVE-2024-28397-js2py-Sandbox-Escape
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2023-4220 POC RCE
URL:https://github.com/insomnia-jacob/CVE-2023-4220
标签:#RCE
更新了:RCE
描述:CVE-2023-4220 POC RCE
URL:https://github.com/insomnia-jacob/CVE-2023-4220
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for CVE-2024-34144
URL:https://github.com/MXWXZ/CVE-2024-34144
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for CVE-2024-34144
URL:https://github.com/MXWXZ/CVE-2024-34144
标签:#CVE-2024
GitHub
GitHub - MXWXZ/CVE-2024-34144: PoC for CVE-2024-34144
PoC for CVE-2024-34144. Contribute to MXWXZ/CVE-2024-34144 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC to test CVE-2024-39929 against EXIM mail servers
URL:https://github.com/michael-david-fry/CVE-2024-39929
标签:#CVE-2024
更新了:CVE-2024
描述:POC to test CVE-2024-39929 against EXIM mail servers
URL:https://github.com/michael-david-fry/CVE-2024-39929
标签:#CVE-2024
GitHub
GitHub - michael-david-fry/CVE-2024-39929: POC to test CVE-2024-39929 against EXIM mail servers
POC to test CVE-2024-39929 against EXIM mail servers - michael-david-fry/CVE-2024-39929
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-21006 exp
URL:https://github.com/lightr3d/CVE-2024-21006_jar
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-21006 exp
URL:https://github.com/lightr3d/CVE-2024-21006_jar
标签:#CVE-2024
GitHub
GitHub - lightr3d/CVE-2024-21006_jar: CVE-2024-21006 exp
CVE-2024-21006 exp. Contribute to lightr3d/CVE-2024-21006_jar development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/etx-Arn/CVE-2024-34102-RCE
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce
URL:https://github.com/etx-Arn/CVE-2024-34102-RCE
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/suifei/fridare
标签:#绕过
更新了:绕过
描述:自动更新获取常用域名服务的即时IP,可以配合SwitchHosts进行一键修改。这样可以绕过相关限制,以及省去DNS查询解析。
URL:https://github.com/suifei/fridare
标签:#绕过
GitHub
GitHub - suifei/fridare: 强大的 Frida 重打包工具,用于 iOS 和 Android。轻松修改 Frida 特征,增强隐蔽性,绕过检测。简化逆向工程和安全测试。Powerful Frida repackaging tool…
强大的 Frida 重打包工具,用于 iOS 和 Android。轻松修改 Frida 特征,增强隐蔽性,绕过检测。简化逆向工程和安全测试。Powerful Frida repackaging tool for iOS and Android. Easily modify Frida servers to enhance stealth and bypass detection. Strea...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Mass Exploit < [CVE-2024-7188 - Bylancer Quicklancer] - SQL Injection
URL:https://github.com/codeb0ss/CVE-2024-7188-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Mass Exploit < [CVE-2024-7188 - Bylancer Quicklancer] - SQL Injection
URL:https://github.com/codeb0ss/CVE-2024-7188-PoC
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof of concept to exploit CVE-2024-40617
URL:https://github.com/KyssK00L/CVE-2024-40617
标签:#CVE-2024
更新了:CVE-2024
描述:Proof of concept to exploit CVE-2024-40617
URL:https://github.com/KyssK00L/CVE-2024-40617
标签:#CVE-2024
GitHub
GitHub - KyssK00L/CVE-2024-40617: CVE-2024-40617 Exploit PoC
CVE-2024-40617 Exploit PoC. Contribute to KyssK00L/CVE-2024-40617 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-6738...
URL:https://github.com/XD3an/CVE-2024-6738
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-6738...
URL:https://github.com/XD3an/CVE-2024-6738
标签:#CVE-2024