GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4577 Exploits
URL:https://github.com/bughuntar/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4577 Exploits
URL:https://github.com/bughuntar/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - bughuntar/CVE-2024-4577: CVE-2024-4577 Exploits
CVE-2024-4577 Exploits. Contribute to bughuntar/CVE-2024-4577 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process.
URL:https://github.com/sudo-subho/CVE-2024-42657
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process.
URL:https://github.com/sudo-subho/CVE-2024-42657
标签:#CVE-2024
GitHub
GitHub - sudo-subho/CVE-2024-42657: CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote…
CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process. - sudo-subho/C...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述: CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookies parameter
URL:https://github.com/sudo-subho/CVE-2024-42658
标签:#CVE-2024
更新了:CVE-2024
描述: CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookies parameter
URL:https://github.com/sudo-subho/CVE-2024-42658
标签:#CVE-2024
GitHub
GitHub - sudo-subho/CVE-2024-42658: CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote…
CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookies parameter - sudo-subho/CVE-2024-42658
GitHub监控消息提醒!!!
更新了:代码审计
描述:sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于devsecops以外,还可以用于安全行业从事者学习漏洞知识或者渗透知识,代码审计,提供了一个实践和学习的环境。本项目采用了前后端分离的设计模式,其中后端利用了轻量级框架 Gin,而前端则使用了 Vue 3。
URL:https://github.com/Night-Master/sdlc
标签:#代码审计
更新了:代码审计
描述:sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于devsecops以外,还可以用于安全行业从事者学习漏洞知识或者渗透知识,代码审计,提供了一个实践和学习的环境。本项目采用了前后端分离的设计模式,其中后端利用了轻量级框架 Gin,而前端则使用了 Vue 3。
URL:https://github.com/Night-Master/sdlc
标签:#代码审计
GitHub
GitHub - Night-Master/sdlc_golang: sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于…
sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于devsecops以外,还可以用于安全行业从事者学习漏洞知识或者渗透知识,代码审计,提供了一个实践和学习的环境。本项目采用了前后端分离的设计模式,其中后端利用了轻量级框架 Gin,而前端则使用了 Vue 3。 -...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:poc for CVE-2024-7646
URL:https://github.com/UgOrange/CVE-2024-7646-poc
标签:#CVE-2024
更新了:CVE-2024
描述:poc for CVE-2024-7646
URL:https://github.com/UgOrange/CVE-2024-7646-poc
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:poc for CVE-2024-7646
URL:https://github.com/lfillaz/CVE-2024-7703
标签:#CVE-2024
更新了:CVE-2024
描述:poc for CVE-2024-7646
URL:https://github.com/lfillaz/CVE-2024-7703
标签:#CVE-2024
GitHub
GitHub - lfillaz/CVE-2024-7703: This repository contains an exploit for CVE-2024-7703 in the ARMember WordPress plugin. It allows…
This repository contains an exploit for CVE-2024-7703 in the ARMember WordPress plugin. It allows attackers with Subscriber-level access or higher to upload SVG files with malicious JavaScript, lea...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Mass Exploit < [CVE-2024-6893/CWE-611 - Journyx] - XML External Entities Injection (XXE) Exploit
URL:https://github.com/codeb0ss/CVE-2024-6893-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Mass Exploit < [CVE-2024-6893/CWE-611 - Journyx] - XML External Entities Injection (XXE) Exploit
URL:https://github.com/codeb0ss/CVE-2024-6893-PoC
标签:#CVE-2024
GitHub
GitHub - codeb0ss/CVE-2024-6893-PoC: Mass Exploit < [CVE-2024-6893/CWE-611 - Journyx] - XML External Entities Injection (XXE) Exploit
Mass Exploit < [CVE-2024-6893/CWE-611 - Journyx] - XML External Entities Injection (XXE) Exploit - codeb0ss/CVE-2024-6893-PoC
GitHub监控消息提醒!!!
更新了:内网渗透
描述:eBSploit适用于内网渗透中遇到MS17-010漏洞的情况快速上线公网msf及cs,同时支持自定义dll命令执行、会话迁移等操作。
URL:https://github.com/Anyyy111/eBSploit
标签:#内网渗透
更新了:内网渗透
描述:eBSploit适用于内网渗透中遇到MS17-010漏洞的情况快速上线公网msf及cs,同时支持自定义dll命令执行、会话迁移等操作。
URL:https://github.com/Anyyy111/eBSploit
标签:#内网渗透
GitHub
GitHub - Anyyy111/eBSploit: eBSploit适用于内网渗透中遇到MS17-010漏洞的情况快速上线公网msf及cs,同时支持自定义dll命令执行、会话迁移等操作。
eBSploit适用于内网渗透中遇到MS17-010漏洞的情况快速上线公网msf及cs,同时支持自定义dll命令执行、会话迁移等操作。 - Anyyy111/eBSploit
GitHub监控消息提醒!!!
更新了:信息收集
描述:x-search 一个方便web打点,一键信息收集的工具
URL:https://github.com/huaiyi255/x-search
标签:#信息收集
更新了:信息收集
描述:x-search 一个方便web打点,一键信息收集的工具
URL:https://github.com/huaiyi255/x-search
标签:#信息收集
GitHub
GitHub - huaiyi255/x-pscan: x-pscan 一个建议的端口存活扫描工具
x-pscan 一个建议的端口存活扫描工具. Contribute to huaiyi255/x-pscan development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE through Nested Function Calls and Character Inversion.
URL:https://github.com/ProbiusOfficial/PHP-inversion
标签:#RCE
更新了:RCE
描述:RCE through Nested Function Calls and Character Inversion.
URL:https://github.com/ProbiusOfficial/PHP-inversion
标签:#RCE
GitHub
GitHub - ProbiusOfficial/PHP-inversion: RCE through Nested Function Calls and Character Inversion.
RCE through Nested Function Calls and Character Inversion. - ProbiusOfficial/PHP-inversion
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-7094 Vulnerability checker
URL:https://github.com/nastar-id/CVE-2024-7094
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-7094 Vulnerability checker
URL:https://github.com/nastar-id/CVE-2024-7094
标签:#CVE-2024
GitHub
GitHub - nastar-id/CVE-2024-7094: CVE-2024-7094 Vulnerability checker
CVE-2024-7094 Vulnerability checker. Contribute to nastar-id/CVE-2024-7094 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo <= 1.4.1 - Authenticated (Contributor+) SQL Injection)
URL:https://github.com/ret2desync/CVE-2024-38793-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo <= 1.4.1 - Authenticated (Contributor+) SQL Injection)
URL:https://github.com/ret2desync/CVE-2024-38793-PoC
标签:#CVE-2024
GitHub
GitHub - ret2desync/CVE-2024-38793-PoC: Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo…
Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo <= 1.4.1 - Authenticated (Contributor+) SQL Injection) - ret2desync/CVE-2024-38793-PoC
GitHub监控消息提醒!!!
更新了:红队
描述:日常积累的一些红队工具及自己写的脚本,更偏向于一些diy的好用的工具,并不是一些比较常用的msf/awvs/xray这种
URL:https://github.com/xiaoZ-hc/redtool
标签:#红队
更新了:红队
描述:日常积累的一些红队工具及自己写的脚本,更偏向于一些diy的好用的工具,并不是一些比较常用的msf/awvs/xray这种
URL:https://github.com/xiaoZ-hc/redtool
标签:#红队
GitHub
GitHub - xiaoZ-hc/redtool: 日常积累的一些红队工具及自己写的脚本,更偏向于一些diy的好用的工具,并不是一些比较常用的msf/awvs/xray这种
日常积累的一些红队工具及自己写的脚本,更偏向于一些diy的好用的工具,并不是一些比较常用的msf/awvs/xray这种 - xiaoZ-hc/redtool
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15
URL:https://github.com/Praison001/CVE-2024-38856-ApacheOfBiz
标签:#CVE-2024
更新了:CVE-2024
描述:Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15
URL:https://github.com/Praison001/CVE-2024-38856-ApacheOfBiz
标签:#CVE-2024
GitHub
GitHub - Praison001/CVE-2024-38856-ApacheOfBiz: Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15
Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15 - Praison001/CVE-2024-38856-ApacheOfBiz
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:bypass-免杀-test
URL:https://github.com/UserLRJ/Bypass-Antivirus
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:bypass-免杀-test
URL:https://github.com/UserLRJ/Bypass-Antivirus
标签:#bypass AntiVirus
GitHub
GitHub - UserLRJ/Bypass-Antivirus: bypass-免杀-test
bypass-免杀-test. Contribute to UserLRJ/Bypass-Antivirus development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540
URL:https://github.com/cyberaz0r/Typecho-Multiple-Vulnerabilities
标签:#CVE-2024
更新了:CVE-2024
描述:Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540
URL:https://github.com/cyberaz0r/Typecho-Multiple-Vulnerabilities
标签:#CVE-2024
GitHub
GitHub - cyberaz0r/Typecho-Multiple-Vulnerabilities: Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540
Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540 - cyberaz0r/Typecho-Multiple-Vulnerabilities
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-0044
URL:https://github.com/MrW0l05zyn/cve-2024-0044
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-0044
URL:https://github.com/MrW0l05zyn/cve-2024-0044
标签:#CVE-2024
GitHub
GitHub - MrW0l05zyn/cve-2024-0044: CVE-2024-0044
CVE-2024-0044. Contribute to MrW0l05zyn/cve-2024-0044 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内网渗透
描述:java实现的反向socks5,特点是客户端单class文件,这样内网渗透不用起新进程
URL:https://github.com/NorthShad0w/JavaReverseProxy
标签:#内网渗透
更新了:内网渗透
描述:java实现的反向socks5,特点是客户端单class文件,这样内网渗透不用起新进程
URL:https://github.com/NorthShad0w/JavaReverseProxy
标签:#内网渗透