GitHub监控消息提醒!!!
更新了:RCE
描述:This repository its for testing my projects about RCE or simply binders
URL:https://github.com/KasaneMitaka/CalcForTests
标签:#RCE
更新了:RCE
描述:This repository its for testing my projects about RCE or simply binders
URL:https://github.com/KasaneMitaka/CalcForTests
标签:#RCE
GitHub
GitHub - KasaneMitaka/CalcForTests: This repository its for testing my projects about RCE or simply binders
This repository its for testing my projects about RCE or simply binders - KasaneMitaka/CalcForTests
👎1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz.
URL:https://github.com/mutkus/CVE-2024-47076
标签:#CVE-2024
更新了:CVE-2024
描述:Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz.
URL:https://github.com/mutkus/CVE-2024-47076
标签:#CVE-2024
GitHub
GitHub - mutkus/CVE-2024-47076: Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile…
Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz. - mutkus/CVE-2024-47076
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A simple CVE-2024-47176 (cups_browsed) check tool written in go.
URL:https://github.com/nma-io/CVE-2024-47176
标签:#CVE-2024
更新了:CVE-2024
描述:A simple CVE-2024-47176 (cups_browsed) check tool written in go.
URL:https://github.com/nma-io/CVE-2024-47176
标签:#CVE-2024
GitHub
GitHub - nma-io/CVE-2024-47176: A simple CVE-2024-47176 (cups_browsed) check tool written in go.
A simple CVE-2024-47176 (cups_browsed) check tool written in go. - GitHub - nma-io/CVE-2024-47176: A simple CVE-2024-47176 (cups_browsed) check tool written in go.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability
URL:https://github.com/latte-soft/kartlanpwn
标签:#CVE-2024
更新了:CVE-2024
描述:Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability
URL:https://github.com/latte-soft/kartlanpwn
标签:#CVE-2024
GitHub
GitHub - latte-soft/kartlanpwn: Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability
Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability - latte-soft/kartlanpwn
GitHub监控消息提醒!!!
更新了:红队
描述:红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
URL:https://github.com/xiaoze521/arl_scan_xpoc_nuclei
标签:#红队
更新了:红队
描述:红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
URL:https://github.com/xiaoze521/arl_scan_xpoc_nuclei
标签:#红队
GitHub
GitHub - xiaoze521/arl_scan_xpoc_nuclei: 红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。
红队自动化打点神器!!! ARL使用代理池联动nuclei,xray并通过企业微信机器人告警。. Contribute to xiaoze521/arl_scan_xpoc_nuclei development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
URL:https://github.com/AgonySec/ThinkPHPGUI
标签:#漏洞检测
更新了:漏洞检测
描述:使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
URL:https://github.com/AgonySec/ThinkPHPGUI
标签:#漏洞检测
GitHub
GitHub - AgonySec/ThinkPHPGUI: 使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具
使用JAVAFX写了一个Thinkphp的GUI漏洞检测利用工具. Contribute to AgonySec/ThinkPHPGUI development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞复现
描述:基于docker的redis未授权访问漏洞复现环境
URL:https://github.com/ajisai-babu/redis-unauth-hub
标签:#漏洞复现
更新了:漏洞复现
描述:基于docker的redis未授权访问漏洞复现环境
URL:https://github.com/ajisai-babu/redis-unauth-hub
标签:#漏洞复现
GitHub
GitHub - ajisai-babu/redis-unauth-hub: 基于docker的redis未授权访问漏洞复现环境
基于docker的redis未授权访问漏洞复现环境. Contribute to ajisai-babu/redis-unauth-hub development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Ultrafast CUPS-browsed scanner (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177)
URL:https://github.com/lkarlslund/jugular
标签:#CVE-2024
更新了:CVE-2024
描述:Ultrafast CUPS-browsed scanner (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177)
URL:https://github.com/lkarlslund/jugular
标签:#CVE-2024
GitHub
GitHub - lkarlslund/jugular: Ultrafast CUPS-browsed scanner (CVE-2024-47176)
Ultrafast CUPS-browsed scanner (CVE-2024-47176). Contribute to lkarlslund/jugular development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:sql注入
描述:利用流量工具,抓取流量层面的sql注入、高危命令等等攻击
URL:https://github.com/chz2008/capturesqli
标签:#sql注入
更新了:sql注入
描述:利用流量工具,抓取流量层面的sql注入、高危命令等等攻击
URL:https://github.com/chz2008/capturesqli
标签:#sql注入
GitHub
GitHub - Zer08Bytes/capturesqli: 利用流量工具,抓取流量层面的sql注入、高危命令等等攻击
利用流量工具,抓取流量层面的sql注入、高危命令等等攻击. Contribute to Zer08Bytes/capturesqli development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-8353
URL:https://github.com/EQSTLab/CVE-2024-8353
标签:#CVE-2024
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-8353
URL:https://github.com/EQSTLab/CVE-2024-8353
标签:#CVE-2024
GitHub
GitHub - EQSTLab/CVE-2024-8353: GiveWP PHP Object Injection exploit
GiveWP PHP Object Injection exploit. Contribute to EQSTLab/CVE-2024-8353 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:bypass av
描述:such cobaltstrike loder to bypass av
URL:https://github.com/rexbrew206ii6z/1av-Microsoft-PowerPointv
标签:#bypass av
更新了:bypass av
描述:such cobaltstrike loder to bypass av
URL:https://github.com/rexbrew206ii6z/1av-Microsoft-PowerPointv
标签:#bypass av
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
URL:https://github.com/geniuszlyy/GenCrushSSTIExploit
标签:#CVE-2024
更新了:CVE-2024
描述:is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
URL:https://github.com/geniuszlyy/GenCrushSSTIExploit
标签:#CVE-2024
GitHub
GitHub - geniuszly/GenCrushSSTIExploit: is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP
is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP - geniuszly/GenCrushSSTIExploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk
URL:https://github.com/PlayerFridei/CVE-2024-28987
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk
URL:https://github.com/PlayerFridei/CVE-2024-28987
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
URL:https://github.com/BertoldVdb/PcanExploit
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
URL:https://github.com/BertoldVdb/PcanExploit
标签:#CVE-2024
GitHub
GitHub - BertoldVdb/PcanExploit: CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways
CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways - BertoldVdb/PcanExploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A vulnerability scanner that searches for the CVE-2024-9166 vulnerability on websites, more info about this vulnerability here: https://www.tenable.com/cve/CVE-2024-9166
URL:https://github.com/Andrysqui/CVE-2024-9166
标签:#CVE-2024
更新了:CVE-2024
描述:A vulnerability scanner that searches for the CVE-2024-9166 vulnerability on websites, more info about this vulnerability here: https://www.tenable.com/cve/CVE-2024-9166
URL:https://github.com/Andrysqui/CVE-2024-9166
标签:#CVE-2024
Tenable
CVE-2024-9166
The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites
URL:https://github.com/geniuszlyy/CVE-2024-5522
标签:#CVE-2024
更新了:CVE-2024
描述:A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites
URL:https://github.com/geniuszlyy/CVE-2024-5522
标签:#CVE-2024
GitHub
GitHub - geniuszlyy/CVE-2024-5522: A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites
A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites - geniuszlyy/CVE-2024-5522
GitHub监控消息提醒!!!
更新了:反序列化
描述:【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行
URL:https://github.com/yukuyoulei/ConfigExcel
标签:#反序列化
更新了:反序列化
描述:【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行
URL:https://github.com/yukuyoulei/ConfigExcel
标签:#反序列化
GitHub
GitHub - yukuyoulei/ConfigExcel: 【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行
【ConfigExcel】 excel导出成C#类并填充数据,省去序列化和反序列化的消耗。以前是不能热更,不往这方面想,能热更了为啥lua能当配置表C#就不行 - yukuyoulei/ConfigExcel
GitHub监控消息提醒!!!
更新了:钓鱼
描述:PC自动玩尘白,尘白自动化代理,尘白禁区助手,尘白自动钓鱼
URL:https://github.com/LaoZhuJackson/SnowbreakAutoAssistant
标签:#钓鱼
更新了:钓鱼
描述:PC自动玩尘白,尘白自动化代理,尘白禁区助手,尘白自动钓鱼
URL:https://github.com/LaoZhuJackson/SnowbreakAutoAssistant
标签:#钓鱼
GitHub
GitHub - LaoZhuJackson/SnowbreakAutoAssistant: PC自动玩尘白,自动化代理,尘白禁区助手,自动钓鱼,信源解析,水弹,异星守护,迷宫
PC自动玩尘白,自动化代理,尘白禁区助手,自动钓鱼,信源解析,水弹,异星守护,迷宫. Contribute to LaoZhuJackson/SnowbreakAutoAssistant development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike.
URL:https://github.com/duck-sec/CVE-2023-41425
标签:#RCE
更新了:RCE
描述:CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike.
URL:https://github.com/duck-sec/CVE-2023-41425
标签:#RCE
GitHub
GitHub - duck-sec/CVE-2023-41425: CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if…
CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike. - duck-sec/CVE-2023-41425
GitHub监控消息提醒!!!
更新了:绕过
描述:这个域名是我用来做远程管理主机用的!因为我之前经常帮助别人,这些人遍布个人,企业,服务器/机房。都有大量的数据和重要服务!这个域名的作用就是通过DNS等隧道技术建立一个内网到外网的反向隧道。那我就可以绕过本地防火墙,直接建立连接!就请你们手下留情,不要发动d dos攻击或者是通过漏洞 弱小口令或社工盗取域名和解析的控制权,更不要通过抓包/中间人攻击或伪造虚假服务器等方式入侵这些主机!
URL:https://github.com/rd3389/domain
标签:#绕过
更新了:绕过
描述:这个域名是我用来做远程管理主机用的!因为我之前经常帮助别人,这些人遍布个人,企业,服务器/机房。都有大量的数据和重要服务!这个域名的作用就是通过DNS等隧道技术建立一个内网到外网的反向隧道。那我就可以绕过本地防火墙,直接建立连接!就请你们手下留情,不要发动d dos攻击或者是通过漏洞 弱小口令或社工盗取域名和解析的控制权,更不要通过抓包/中间人攻击或伪造虚假服务器等方式入侵这些主机!
URL:https://github.com/rd3389/domain
标签:#绕过
GitHub
rd3389/domain
这个域名是我用来做远程管理主机用的!因为我之前经常帮助别人,这些人遍布个人,企业,服务器/机房。都有大量的数据和重要服务!这个域名的作用就是通过DNS等隧道技术建立一个内网到外网的反向隧道。那我就可以绕过本地防火墙,直接建立连接!就请你们手下留情,不要发动d dos攻击或者是通过漏洞 弱小口令或社工盗取域名和解析的控制权,更不要通过抓包/中间人攻击或伪造虚假服务器等方式入侵这些主机! - r...