GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses
URL:https://github.com/geniuszlyy/CVE-2024-24919
标签:#CVE-2024
更新了:CVE-2024
描述:PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses
URL:https://github.com/geniuszlyy/CVE-2024-24919
标签:#CVE-2024
GitHub
GitHub - geniuszlyy/CVE-2024-24919: PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security…
PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses - geniuszlyy/CVE-2024-24919
GitHub监控消息提醒!!!
更新了:代码审计
描述:一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
URL:https://github.com/Night-Master/sdlc_python
标签:#代码审计
更新了:代码审计
描述:一款轻量级匹配Sink点的代码审计扫描器,为了帮助红队过程中快速代码审计的小工具
URL:https://github.com/Night-Master/sdlc_python
标签:#代码审计
GitHub
GitHub - Night-Master/sdlc_python: sdlc_python 是一个基于python语言构建的devsecops平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员…
sdlc_python 是一个基于python语言构建的devsecops平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识(对应sdlc中对开发人员的安全培训),并且使用了大模型进行代码安全审计(对应sdlc中代码审计阶段),帮助企业进行安全左移。除了用于 DevSecOps 实践外,sdlc_python 还可以用于学习...
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository its for testing my projects about RCE or simply binders
URL:https://github.com/KasaneMitaka/CalcForTests
标签:#RCE
更新了:RCE
描述:This repository its for testing my projects about RCE or simply binders
URL:https://github.com/KasaneMitaka/CalcForTests
标签:#RCE
GitHub
GitHub - KasaneMitaka/CalcForTests: This repository its for testing my projects about RCE or simply binders
This repository its for testing my projects about RCE or simply binders - KasaneMitaka/CalcForTests
👎1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz.
URL:https://github.com/mutkus/CVE-2024-47076
标签:#CVE-2024
更新了:CVE-2024
描述:Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz.
URL:https://github.com/mutkus/CVE-2024-47076
标签:#CVE-2024
GitHub
GitHub - mutkus/CVE-2024-47076: Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile…
Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz. - mutkus/CVE-2024-47076
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A simple CVE-2024-47176 (cups_browsed) check tool written in go.
URL:https://github.com/nma-io/CVE-2024-47176
标签:#CVE-2024
更新了:CVE-2024
描述:A simple CVE-2024-47176 (cups_browsed) check tool written in go.
URL:https://github.com/nma-io/CVE-2024-47176
标签:#CVE-2024
GitHub
GitHub - nma-io/CVE-2024-47176: A simple CVE-2024-47176 (cups_browsed) check tool written in go.
A simple CVE-2024-47176 (cups_browsed) check tool written in go. - GitHub - nma-io/CVE-2024-47176: A simple CVE-2024-47176 (cups_browsed) check tool written in go.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability
URL:https://github.com/latte-soft/kartlanpwn
标签:#CVE-2024
更新了:CVE-2024
描述:Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability
URL:https://github.com/latte-soft/kartlanpwn
标签:#CVE-2024
GitHub
GitHub - latte-soft/kartlanpwn: Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability
Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability - latte-soft/kartlanpwn
GitHub监控消息提醒!!!
更新了:红队
描述:红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
URL:https://github.com/xiaoze521/arl_scan_xpoc_nuclei
标签:#红队
更新了:红队
描述:红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
URL:https://github.com/xiaoze521/arl_scan_xpoc_nuclei
标签:#红队
GitHub
GitHub - xiaoze521/arl_scan_xpoc_nuclei: 红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。. Contribute to xiaoze521/arl_scan_xpoc_nuclei development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
URL:https://github.com/AgonySec/ThinkPHPGUI
标签:#漏洞检测
更新了:漏洞检测
描述:使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
URL:https://github.com/AgonySec/ThinkPHPGUI
标签:#漏洞检测
GitHub
GitHub - AgonySec/ThinkPHPGUI: 使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具. Contribute to AgonySec/ThinkPHPGUI development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞复现
描述:基于docker的redis未授权访问漏洞复现环境
URL:https://github.com/ajisai-babu/redis-unauth-hub
标签:#漏洞复现
更新了:漏洞复现
描述:基于docker的redis未授权访问漏洞复现环境
URL:https://github.com/ajisai-babu/redis-unauth-hub
标签:#漏洞复现
GitHub
GitHub - ajisai-babu/redis-unauth-hub: 基于docker的redis未授权访问漏洞复现环境
基于docker的redis未授权访问漏洞复现环境. Contribute to ajisai-babu/redis-unauth-hub development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Ultrafast CUPS-browsed scanner (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177)
URL:https://github.com/lkarlslund/jugular
标签:#CVE-2024
更新了:CVE-2024
描述:Ultrafast CUPS-browsed scanner (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177)
URL:https://github.com/lkarlslund/jugular
标签:#CVE-2024
GitHub
GitHub - lkarlslund/jugular: Ultrafast CUPS-browsed scanner (CVE-2024-47176)
Ultrafast CUPS-browsed scanner (CVE-2024-47176). Contribute to lkarlslund/jugular development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:利用流量工具,抓取流量层面的sql注入、高危命令等等攻击
URL:https://github.com/chz2008/capturesqli
标签:#sql注入
更新了:sql注入
描述:利用流量工具,抓取流量层面的sql注入、高危命令等等攻击
URL:https://github.com/chz2008/capturesqli
标签:#sql注入
GitHub
GitHub - Zer08Bytes/capturesqli: 利用流量工具,抓取流量层面的sql注入、高危命令等等攻击
利用流量工具,抓取流量层面的sql注入、高危命令等等攻击. Contribute to Zer08Bytes/capturesqli development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-8353
URL:https://github.com/EQSTLab/CVE-2024-8353
标签:#CVE-2024
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-8353
URL:https://github.com/EQSTLab/CVE-2024-8353
标签:#CVE-2024
GitHub
GitHub - EQSTLab/CVE-2024-8353: GiveWP PHP Object Injection exploit
GiveWP PHP Object Injection exploit. Contribute to EQSTLab/CVE-2024-8353 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass av
描述:such cobaltstrike loder to bypass av
URL:https://github.com/rexbrew206ii6z/1av-Microsoft-PowerPointv
标签:#bypass av
更新了:bypass av
描述:such cobaltstrike loder to bypass av
URL:https://github.com/rexbrew206ii6z/1av-Microsoft-PowerPointv
标签:#bypass av
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
URL:https://github.com/geniuszlyy/GenCrushSSTIExploit
标签:#CVE-2024
更新了:CVE-2024
描述:is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
URL:https://github.com/geniuszlyy/GenCrushSSTIExploit
标签:#CVE-2024
GitHub
GitHub - geniuszly/GenCrushSSTIExploit: is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP - geniuszly/GenCrushSSTIExploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk
URL:https://github.com/PlayerFridei/CVE-2024-28987
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk
URL:https://github.com/PlayerFridei/CVE-2024-28987
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
URL:https://github.com/BertoldVdb/PcanExploit
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
URL:https://github.com/BertoldVdb/PcanExploit
标签:#CVE-2024
GitHub
GitHub - BertoldVdb/PcanExploit: CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways - BertoldVdb/PcanExploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A vulnerability scanner that searches for the CVE-2024-9166 vulnerability on websites, more info about this vulnerability here: https://www.tenable.com/cve/CVE-2024-9166
URL:https://github.com/Andrysqui/CVE-2024-9166
标签:#CVE-2024
更新了:CVE-2024
描述:A vulnerability scanner that searches for the CVE-2024-9166 vulnerability on websites, more info about this vulnerability here: https://www.tenable.com/cve/CVE-2024-9166
URL:https://github.com/Andrysqui/CVE-2024-9166
标签:#CVE-2024
Tenable
CVE-2024-9166
The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites
URL:https://github.com/geniuszlyy/CVE-2024-5522
标签:#CVE-2024
更新了:CVE-2024
描述:A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites
URL:https://github.com/geniuszlyy/CVE-2024-5522
标签:#CVE-2024
GitHub
GitHub - geniuszlyy/CVE-2024-5522: A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites
A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites - geniuszlyy/CVE-2024-5522
GitHub监控消息提醒!!!
更新了:反序列化
描述:【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行
URL:https://github.com/yukuyoulei/ConfigExcel
标签:#反序列化
更新了:反序列化
描述:【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行
URL:https://github.com/yukuyoulei/ConfigExcel
标签:#反序列化
GitHub
GitHub - yukuyoulei/ConfigExcel: 【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行
【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行 - yukuyoulei/ConfigExcel
GitHub监控消息提醒!!!
更新了:钓鱼
描述:PC自动玩尘白,尘白自动化代理,尘白禁区助手,尘白自动钓鱼
URL:https://github.com/LaoZhuJackson/SnowbreakAutoAssistant
标签:#钓鱼
更新了:钓鱼
描述:PC自动玩尘白,尘白自动化代理,尘白禁区助手,尘白自动钓鱼
URL:https://github.com/LaoZhuJackson/SnowbreakAutoAssistant
标签:#钓鱼
GitHub
GitHub - LaoZhuJackson/SnowbreakAutoAssistant: PC自动玩尘白,自动化代理,尘白禁区助手,自动钓鱼,信源解析,水弹,异星守护,迷宫
PC自动玩尘白,自动化代理,尘白禁区助手,自动钓鱼,信源解析,水弹,异星守护,迷宫. Contribute to LaoZhuJackson/SnowbreakAutoAssistant development by creating an account on GitHub.