GitHub监控消息提醒!!!
更新了:CVE-2024
描述: CVE-2024-47575: FortiManager Missing Authentication
URL:https://github.com/DaresNone/CVE-2024-47575
标签:#CVE-2024
更新了:CVE-2024
描述: CVE-2024-47575: FortiManager Missing Authentication
URL:https://github.com/DaresNone/CVE-2024-47575
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:Developed PoC for pymatgen <= 2024.2.8 Insecure Deserialization RCE
URL:https://github.com/bluetoothStrawberry/CVE-2024-23346_poc
标签:#RCE
更新了:RCE
描述:Developed PoC for pymatgen <= 2024.2.8 Insecure Deserialization RCE
URL:https://github.com/bluetoothStrawberry/CVE-2024-23346_poc
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:NanoCore 1.2.2.0 Nanocore is sophisticated second-stage malware classified as a Remote Access Trojan (RAT) that provides attackers with Remote Code Execution (RCE) on a victim's system.
URL:https://github.com/bridDev/NanoCore-1.2.2.0
标签:#RCE
更新了:RCE
描述:NanoCore 1.2.2.0 Nanocore is sophisticated second-stage malware classified as a Remote Access Trojan (RAT) that provides attackers with Remote Code Execution (RCE) on a victim's system.
URL:https://github.com/bridDev/NanoCore-1.2.2.0
标签:#RCE
GitHub
GitHub - bridDev/NanoCore-1.2.2.0: NanoCore 1.2.2.0 Nanocore is sophisticated second-stage malware classified as a Remote Access…
NanoCore 1.2.2.0 Nanocore is sophisticated second-stage malware classified as a Remote Access Trojan (RAT) that provides attackers with Remote Code Execution (RCE) on a victim's system. -...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Roundcube mail server exploit for CVE-2024-37383 (Stored XSS)
URL:https://github.com/amirzargham/CVE-2024-37383-exploit
标签:#CVE-2024
更新了:CVE-2024
描述:Roundcube mail server exploit for CVE-2024-37383 (Stored XSS)
URL:https://github.com/amirzargham/CVE-2024-37383-exploit
标签:#CVE-2024
GitHub
GitHub - amirzargham/CVE-2024-37383-exploit: Roundcube mail server exploit for CVE-2024-37383 (Stored XSS)
Roundcube mail server exploit for CVE-2024-37383 (Stored XSS) - amirzargham/CVE-2024-37383-exploit
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-7988-Private-POC
URL:https://github.com/hatvix1/CVE-2024-7988-Private-POC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-7988-Private-POC
URL:https://github.com/hatvix1/CVE-2024-7988-Private-POC
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:mayuri_k_canteen-management-system_RCE
URL:https://github.com/NketiahGodfred/mayuri_k_canteen-management-system_RCE
标签:#RCE
更新了:RCE
描述:mayuri_k_canteen-management-system_RCE
URL:https://github.com/NketiahGodfred/mayuri_k_canteen-management-system_RCE
标签:#RCE
GitHub
GitHub - NketiahGodfred/mayuri_k_canteen-management-system_RCE: mayuri_k_canteen-management-system_RCE
mayuri_k_canteen-management-system_RCE. Contribute to NketiahGodfred/mayuri_k_canteen-management-system_RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于书籍文本属性与链接关系的类别预测信息收集 DataFountain 比赛代码
URL:https://github.com/zzhaire/DigDigBooks
标签:#信息收集
更新了:信息收集
描述:基于书籍文本属性与链接关系的类别预测信息收集 DataFountain 比赛代码
URL:https://github.com/zzhaire/DigDigBooks
标签:#信息收集
GitHub
GitHub - zzhaire/DigDigBooks: 基于书籍文本属性与链接关系的类别预测信息收集 DataFountain 比赛代码
基于书籍文本属性与链接关系的类别预测信息收集 DataFountain 比赛代码. Contribute to zzhaire/DigDigBooks development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/MammaniNelsonD/P4IvisualInyect
标签:#RCE
更新了:RCE
描述:TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
URL:https://github.com/MammaniNelsonD/P4IvisualInyect
标签:#RCE
GitHub
GitHub - MammaniNelsonD/P4IvisualInyect: Una Tool 🔍 para BugHunters que escanea URLs con parámetros de inyección obtenidos con…
Una Tool 🔍 para BugHunters que escanea URLs con parámetros de inyección obtenidos con GoSpider, automatizando pruebas visualmente en Firefox. Detecta XSS, LFI, RCE y SQLi ⚠️, inyectando payloads po...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arbitrary Code Execution Vulnerability
URL:https://github.com/canyie/MagiskEoP
标签:#CVE-2024
更新了:CVE-2024
描述:Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arbitrary Code Execution Vulnerability
URL:https://github.com/canyie/MagiskEoP
标签:#CVE-2024
GitHub
GitHub - canyie/MagiskEoP: Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug…
Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation / Arbitrary Code Execution Vulnerability - canyie/MagiskEoP
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试时,个人测试APP时模版以及相关资料脚本整理
URL:https://github.com/Cha111Ng1/APPscript
标签:#渗透测试
更新了:渗透测试
描述:渗透测试时,个人测试APP时模版以及相关资料脚本整理
URL:https://github.com/Cha111Ng1/APPscript
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Serverside Template Injection (SSTI) RCE - THM challenge \"whiterose\"
URL:https://github.com/l0n3m4n/CVE-2024-4577
标签:#CVE-2024
更新了:CVE-2024
描述:Serverside Template Injection (SSTI) RCE - THM challenge \"whiterose\"
URL:https://github.com/l0n3m4n/CVE-2024-4577
标签:#CVE-2024
GitHub
GitHub - l0n3m4n/CVE-2022-29078: Serverside Template Injection (SSTI) RCE - THM challenge "whiterose"
Serverside Template Injection (SSTI) RCE - THM challenge "whiterose" - GitHub - l0n3m4n/CVE-2022-29078: Serverside Template Injection (SSTI) RCE - THM challenge "whiterose"
GitHub监控消息提醒!!!
更新了:RCE
描述:Serverside Template Injection (SSTI) RCE - THM challenge \"whiterose\"
URL:https://github.com/l0n3m4n/CVE-2022-29078
标签:#RCE
更新了:RCE
描述:Serverside Template Injection (SSTI) RCE - THM challenge \"whiterose\"
URL:https://github.com/l0n3m4n/CVE-2022-29078
标签:#RCE
GitHub
GitHub - l0n3m4n/CVE-2022-29078: Serverside Template Injection (SSTI) RCE - THM challenge "whiterose"
Serverside Template Injection (SSTI) RCE - THM challenge "whiterose" - GitHub - l0n3m4n/CVE-2022-29078: Serverside Template Injection (SSTI) RCE - THM challenge "whiterose"
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-43093
URL:https://github.com/hatvix1/CVE-2024-43093
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-43093
URL:https://github.com/hatvix1/CVE-2024-43093
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:信息收集
描述:TestNet资产管理系统(资产管理|信息收集|暴露面管理|子域名扫描|C段扫描|端口扫描|漏洞扫描|Hunter|Fofa)
URL:https://github.com/testnet0/testnet
标签:#信息收集
更新了:信息收集
描述:TestNet资产管理系统(资产管理|信息收集|暴露面管理|子域名扫描|C段扫描|端口扫描|漏洞扫描|Hunter|Fofa)
URL:https://github.com/testnet0/testnet
标签:#信息收集
GitHub
GitHub - testnet0/testnet: TestNet资产管理系统(资产管理|信息收集|暴露面管理|子域名扫描|C段扫描|端口扫描|漏洞扫描|Hunter|Fofa)
TestNet资产管理系统(资产管理|信息收集|暴露面管理|子域名扫描|C段扫描|端口扫描|漏洞扫描|Hunter|Fofa) - testnet0/testnet
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4577 RCE PoC
URL:https://github.com/BTtea/CVE-2024-4577-RCE-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4577 RCE PoC
URL:https://github.com/BTtea/CVE-2024-4577-RCE-PoC
标签:#CVE-2024
GitHub
GitHub - BTtea/CVE-2024-4577-RCE-PoC: CVE-2024-4577 RCE PoC
CVE-2024-4577 RCE PoC. Contribute to BTtea/CVE-2024-4577-RCE-PoC development by creating an account on GitHub.
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-38077 private for 10 hands
URL:https://github.com/amfg145/CVE-2024-38077
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-38077 private for 10 hands
URL:https://github.com/amfg145/CVE-2024-38077
标签:#CVE-2024
GitHub
GitHub - amfg145/CVE-2024-38077: CVE-2024-38077 private for 10 hands
CVE-2024-38077 private for 10 hands. Contribute to amfg145/CVE-2024-38077 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:RCE exploit for low privileged user via CSRF in open-webui
URL:https://github.com/TheUnknownSoul/CVE-2024-7808
标签:#CVE-2024
更新了:CVE-2024
描述:RCE exploit for low privileged user via CSRF in open-webui
URL:https://github.com/TheUnknownSoul/CVE-2024-7808
标签:#CVE-2024
GitHub
GitHub - TheUnknownSoul/CVE-2024-7808: RCE exploit for low privileged user via CSRF in open-webui
RCE exploit for low privileged user via CSRF in open-webui - GitHub - TheUnknownSoul/CVE-2024-7808: RCE exploit for low privileged user via CSRF in open-webui
GitHub监控消息提醒!!!
更新了:代码审计
描述:基于Java开发的代码字符串搜索工具,用于辅助快速代码审计,筛选危险方法名称搜索代码中可能存在的漏洞
URL:https://github.com/youki992/CodeStringSearcher
标签:#代码审计
更新了:代码审计
描述:基于Java开发的代码字符串搜索工具,用于辅助快速代码审计,筛选危险方法名称搜索代码中可能存在的漏洞
URL:https://github.com/youki992/CodeStringSearcher
标签:#代码审计
GitHub
GitHub - youki992/CodeStringSearcher: 基于Java开发的代码字符串搜索工具,用于辅助快速代码审计,筛选危险方法名称搜索代码中可能存在的漏洞
基于Java开发的代码字符串搜索工具,用于辅助快速代码审计,筛选危险方法名称搜索代码中可能存在的漏洞 - youki992/CodeStringSearcher
GitHub监控消息提醒!!!
更新了:护网
描述:三层镜像 跳板机系统 安全稳定线路 不限制内容 免实名!! 提升你的网络访问安全和匿名性,绕过地理限制,保护你的数据! 跳板机系统极致安全,全面防护!您是否需要在复杂的网络环境中安全高效地管理服务器?我们的跳板机系统通过HTTP代理、堡垒系统和工作站的多层防护,确保您的数据传输安全和系统管理便捷。无论您是个人用户还是企业客户,我们的系统都能为您提供一流的安全保障和管理能力。
URL:https://github.com/ajcdn022/ajcdnxy022
标签:#护网
更新了:护网
描述:三层镜像 跳板机系统 安全稳定线路 不限制内容 免实名!! 提升你的网络访问安全和匿名性,绕过地理限制,保护你的数据! 跳板机系统极致安全,全面防护!您是否需要在复杂的网络环境中安全高效地管理服务器?我们的跳板机系统通过HTTP代理、堡垒系统和工作站的多层防护,确保您的数据传输安全和系统管理便捷。无论您是个人用户还是企业客户,我们的系统都能为您提供一流的安全保障和管理能力。
URL:https://github.com/ajcdn022/ajcdnxy022
标签:#护网
GitHub
ajcdn022/ajcdnxy022
三层镜像 跳板机系统 安全稳定线路 不限制内容 免实名!! 提升你的网络访问安全和匿名性,绕过地理限制,保护你的数据! 跳板机系统极致安全,全面防护!您是否需要在复杂的网络环境中安全高效地管理服务器?我们的跳板机系统通过HTTP代理、堡垒系统和工作站的多层防护,确保您的数据传输安全和系统管理便捷。无论您是个人用户还是企业客户,我们的系统都能为您提供一流的安全保障和管理能力。 - ajcdn...