GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-7094 Vulnerability checker
URL:https://github.com/nastar-id/CVE-2024-7094
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-7094 Vulnerability checker
URL:https://github.com/nastar-id/CVE-2024-7094
标签:#CVE-2024
GitHub
GitHub - nastar-id/CVE-2024-7094: CVE-2024-7094 Vulnerability checker
CVE-2024-7094 Vulnerability checker. Contribute to nastar-id/CVE-2024-7094 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo <= 1.4.1 - Authenticated (Contributor+) SQL Injection)
URL:https://github.com/ret2desync/CVE-2024-38793-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo <= 1.4.1 - Authenticated (Contributor+) SQL Injection)
URL:https://github.com/ret2desync/CVE-2024-38793-PoC
标签:#CVE-2024
GitHub
GitHub - ret2desync/CVE-2024-38793-PoC: Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo…
Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo <= 1.4.1 - Authenticated (Contributor+) SQL Injection) - ret2desync/CVE-2024-38793-PoC
GitHub监控消息提醒!!!
更新了:红队
描述:日常积累的一些红队工具及自己写的脚本,更偏向于一些diy的好用的工具,并不是一些比较常用的msf/awvs/xray这种
URL:https://github.com/xiaoZ-hc/redtool
标签:#红队
更新了:红队
描述:日常积累的一些红队工具及自己写的脚本,更偏向于一些diy的好用的工具,并不是一些比较常用的msf/awvs/xray这种
URL:https://github.com/xiaoZ-hc/redtool
标签:#红队
GitHub
GitHub - xiaoZ-hc/redtool: 日常积累的一些红队工具及自己写的脚本,更偏向于一些diy的好用的工具,并不是一些比较常用的msf/awvs/xray这种
日常积累的一些红队工具及自己写的脚本,更偏向于一些diy的好用的工具,并不是一些比较常用的msf/awvs/xray这种 - xiaoZ-hc/redtool
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15
URL:https://github.com/Praison001/CVE-2024-38856-ApacheOfBiz
标签:#CVE-2024
更新了:CVE-2024
描述:Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15
URL:https://github.com/Praison001/CVE-2024-38856-ApacheOfBiz
标签:#CVE-2024
GitHub
GitHub - Praison001/CVE-2024-38856-ApacheOfBiz: Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15
Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15 - Praison001/CVE-2024-38856-ApacheOfBiz
GitHub监控消息提醒!!!
更新了:bypass AntiVirus
描述:bypass-免杀-test
URL:https://github.com/UserLRJ/Bypass-Antivirus
标签:#bypass AntiVirus
更新了:bypass AntiVirus
描述:bypass-免杀-test
URL:https://github.com/UserLRJ/Bypass-Antivirus
标签:#bypass AntiVirus
GitHub
GitHub - UserLRJ/Bypass-Antivirus: bypass-免杀-test
bypass-免杀-test. Contribute to UserLRJ/Bypass-Antivirus development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540
URL:https://github.com/cyberaz0r/Typecho-Multiple-Vulnerabilities
标签:#CVE-2024
更新了:CVE-2024
描述:Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540
URL:https://github.com/cyberaz0r/Typecho-Multiple-Vulnerabilities
标签:#CVE-2024
GitHub
GitHub - cyberaz0r/Typecho-Multiple-Vulnerabilities: Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540
Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540 - cyberaz0r/Typecho-Multiple-Vulnerabilities
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-0044
URL:https://github.com/MrW0l05zyn/cve-2024-0044
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-0044
URL:https://github.com/MrW0l05zyn/cve-2024-0044
标签:#CVE-2024
GitHub
GitHub - MrW0l05zyn/cve-2024-0044: CVE-2024-0044
CVE-2024-0044. Contribute to MrW0l05zyn/cve-2024-0044 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:内网渗透
描述:java实现的反向socks5,特点是客户端单class文件,这样内网渗透不用起新进程
URL:https://github.com/NorthShad0w/JavaReverseProxy
标签:#内网渗透
更新了:内网渗透
描述:java实现的反向socks5,特点是客户端单class文件,这样内网渗透不用起新进程
URL:https://github.com/NorthShad0w/JavaReverseProxy
标签:#内网渗透
GitHub监控消息提醒!!!
更新了:弱口令
描述:批量检测tomcat弱口令和web认证页面
URL:https://github.com/HOrange147/Unauthorized
标签:#弱口令
更新了:弱口令
描述:批量检测tomcat弱口令和web认证页面
URL:https://github.com/HOrange147/Unauthorized
标签:#弱口令
GitHub
GitHub - HOrange147/Unauthorized: 批量检测tomcat弱口令和web认证页面
批量检测tomcat弱口令和web认证页面. Contribute to HOrange147/Unauthorized development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:burpsuite中的sql注入测试插件
URL:https://github.com/xiadmin6/SQL_Testing_Tool
标签:#sql注入
更新了:sql注入
描述:burpsuite中的sql注入测试插件
URL:https://github.com/xiadmin6/SQL_Testing_Tool
标签:#sql注入
GitHub
GitHub - xiadmin6/SQL_Testing_Tool: burpsuite中的sql注入测试插件
burpsuite中的sql注入测试插件. Contribute to xiadmin6/SQL_Testing_Tool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:A Red Team Activity Hub
URL:https://github.com/nccgroup/SteppingStones
标签:#Red Team
更新了:Red Team
描述:A Red Team Activity Hub
URL:https://github.com/nccgroup/SteppingStones
标签:#Red Team
GitHub
GitHub - nccgroup/SteppingStones: A Red Team Activity Hub
A Red Team Activity Hub. Contribute to nccgroup/SteppingStones development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:burp
描述:xp_CAPTCHA(瞎跑 白嫖版) burp 验证码 识别 burp插件
URL:https://github.com/smxiazi/NEW_xp_CAPTCHA
标签:#burp
更新了:burp
描述:xp_CAPTCHA(瞎跑 白嫖版) burp 验证码 识别 burp插件
URL:https://github.com/smxiazi/NEW_xp_CAPTCHA
标签:#burp
GitHub
GitHub - smxiazi/NEW_xp_CAPTCHA: xp_CAPTCHA(瞎跑 白嫖版) burp 验证码 识别 burp插件
xp_CAPTCHA(瞎跑 白嫖版) burp 验证码 识别 burp插件. Contribute to smxiazi/NEW_xp_CAPTCHA development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:webshell
描述:Opensource webshell, godzilla,antsword,behinder bypass webshell
URL:https://github.com/devexpshell/aspx-shell
标签:#webshell
更新了:webshell
描述:Opensource webshell, godzilla,antsword,behinder bypass webshell
URL:https://github.com/devexpshell/aspx-shell
标签:#webshell
GitHub
GitHub - devexpshell/aspx-shell: Opensource webshell, godzilla,antsword,behinder bypass webshell
Opensource webshell, godzilla,antsword,behinder bypass webshell - devexpshell/aspx-shell
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PHP CGI Argument Injection (CVE-2024-4577) RCE
URL:https://github.com/fa-rrel/-CVE-2024-4577-RCE
标签:#CVE-2024
更新了:CVE-2024
描述:PHP CGI Argument Injection (CVE-2024-4577) RCE
URL:https://github.com/fa-rrel/-CVE-2024-4577-RCE
标签:#CVE-2024
GitHub
GitHub - gh-ost00/CVE-2024-4577-RCE: PHP CGI Argument Injection (CVE-2024-4577) RCE
PHP CGI Argument Injection (CVE-2024-4577) RCE. Contribute to gh-ost00/CVE-2024-4577-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP CGI Argument Injection (CVE-2024-4577) RCE
URL:https://github.com/fa-rrel/CVE-2024-4577-RCE
标签:#RCE
更新了:RCE
描述:PHP CGI Argument Injection (CVE-2024-4577) RCE
URL:https://github.com/fa-rrel/CVE-2024-4577-RCE
标签:#RCE
GitHub
GitHub - gh-ost00/CVE-2024-4577-RCE: PHP CGI Argument Injection (CVE-2024-4577) RCE
PHP CGI Argument Injection (CVE-2024-4577) RCE. Contribute to gh-ost00/CVE-2024-4577-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:PHP代码审计案例-1000PHP
URL:https://github.com/WiKi-Hub-2023/WiKi-Hub-2023.github.io
标签:#代码审计
更新了:代码审计
描述:PHP代码审计案例-1000PHP
URL:https://github.com/WiKi-Hub-2023/WiKi-Hub-2023.github.io
标签:#代码审计
GitHub
GitHub - WiKi-Hub-2023/WiKi-Hub-2023.github.io: PHP代码审计案例-1000PHP
PHP代码审计案例-1000PHP. Contribute to WiKi-Hub-2023/WiKi-Hub-2023.github.io development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:免杀
描述:MetaDataSacker(元数据掠夺者):可将其他官方exe中数字签名,图标,详细信息复制到没有签名的EXE中,作为免杀,权限维持,伪装的一种小手段
URL:https://github.com/smallvoter/MetaDataSacker
标签:#免杀
更新了:免杀
描述:MetaDataSacker(元数据掠夺者):可将其他官方exe中数字签名,图标,详细信息复制到没有签名的EXE中,作为免杀,权限维持,伪装的一种小手段
URL:https://github.com/smallvoter/MetaDataSacker
标签:#免杀
GitHub
GitHub - smallvoter/MetaDataSacker: MetaDataSacker(元数据掠夺者):可将其他官方exe中数字签名,图标,详细信息复制到没有签名的EXE中,作为免杀,权限维持,伪装的一种小手段
MetaDataSacker(元数据掠夺者):可将其他官方exe中数字签名,图标,详细信息复制到没有签名的EXE中,作为免杀,权限维持,伪装的一种小手段 - smallvoter/MetaDataSacker
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PHP CGI Argument Injection (CVE-2024-4577) RCE
URL:https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix
标签:#CVE-2024
更新了:CVE-2024
描述:PHP CGI Argument Injection (CVE-2024-4577) RCE
URL:https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix
标签:#CVE-2024
GitHub
GitHub - almogopp/Disable-IPv6-CVE-2024-38063-Fix: A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability…
A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without n...