GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.
URL:https://github.com/Patrick-DE/C2-logparser
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.
URL:https://github.com/Patrick-DE/C2-logparser
标签:#Cobalt Strike
GitHub
GitHub - Patrick-DE/C2-logparser: Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used…
Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports. - Patrick-DE/C2-logparser
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! - boku7/BokuLoader
URL:https://github.com/Hunobas/tgfae
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! - boku7/BokuLoader
URL:https://github.com/Hunobas/tgfae
标签:#Cobalt Strike
GitHub
GitHub - Hunobas/tgfae: A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt…
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! - boku7/BokuLoader - Hunobas/tgfae
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-9659: Unrestricted Upload of File with Dangerous Type (CWE-434)
URL:https://github.com/zetraxz/CVE-2024-9659
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-9659: Unrestricted Upload of File with Dangerous Type (CWE-434)
URL:https://github.com/zetraxz/CVE-2024-9659
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:poc-CVE-2024-5057
URL:https://github.com/g1thubb004/poc-CVE-2024-5057
标签:#CVE-2024
更新了:CVE-2024
描述:poc-CVE-2024-5057
URL:https://github.com/g1thubb004/poc-CVE-2024-5057
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Red Team
描述:Collection of tools, code samples, and documentation to assist in AI Red Teaming
URL:https://github.com/aexcode/airt
标签:#Red Team
更新了:Red Team
描述:Collection of tools, code samples, and documentation to assist in AI Red Teaming
URL:https://github.com/aexcode/airt
标签:#Red Team
GitHub
GitHub - aexcode/airt: Collection of tools, code samples, and documentation to assist in AI Red Teaming
Collection of tools, code samples, and documentation to assist in AI Red Teaming - aexcode/airt
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.
URL:https://github.com/XiaomingX/cve-2024-51567-poc
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.
URL:https://github.com/XiaomingX/cve-2024-51567-poc
标签:#CVE-2024
GitHub
GitHub - XiaomingX/cve-2024-51567-poc: CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s…
CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections. - XiaomingX/cve-2024-51567-poc
GitHub监控消息提醒!!!
更新了:Red Team
描述:Interview Preparation for VATP || Penetration Testing ( Web, Mobile, API etc) || Cloud || SOC || Red Teaming || DevSecOps
URL:https://github.com/m14r41/CyberSecurity-Interview
标签:#Red Team
更新了:Red Team
描述:Interview Preparation for VATP || Penetration Testing ( Web, Mobile, API etc) || Cloud || SOC || Red Teaming || DevSecOps
URL:https://github.com/m14r41/CyberSecurity-Interview
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Event Tickets with Ticket Scanner WordPress 플러그인(CVE-2024-52427)의 불완전 패치 발견 및 권한 격하(Author → Contributor) 취약점 분석
URL:https://github.com/DoTTak/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report
标签:#CVE-2024
更新了:CVE-2024
描述:Event Tickets with Ticket Scanner WordPress 플러그인(CVE-2024-52427)의 불완전 패치 발견 및 권한 격하(Author → Contributor) 취약점 분석
URL:https://github.com/DoTTak/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team tools weaponized
URL:https://github.com/sneakerhax/Arsenal
标签:#Red Team
更新了:Red Team
描述:Red Team tools weaponized
URL:https://github.com/sneakerhax/Arsenal
标签:#Red Team
GitHub
GitHub - sneakerhax/Arsenal: Red Team tools weaponized
Red Team tools weaponized. Contribute to sneakerhax/Arsenal development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/jeecgboot/JeecgBoot
标签:#代码注入
更新了:代码注入
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/jeecgboot/JeecgBoot
标签:#代码注入
GitHub
GitHub - jeecgboot/JeecgBoot: 【AI低代码平台】AI low-code platform empowers enterprises to quickly develop low-code solutions and build…
【AI低代码平台】AI low-code platform empowers enterprises to quickly develop low-code solutions and build AI applications. 助力企业快速实现低代码开发和构建AI应用! AI应用平台涵盖:AI应用、AI模型、AI聊天助手、知识库、AI流程编排、MCP和插件,聊天式业务操作等。 强大代码...
GitHub监控消息提醒!!!
更新了:bypassav
描述:免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
URL:https://github.com/aeverj/NimShellCodeLoader
标签:#bypassav
更新了:bypassav
描述:免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
URL:https://github.com/aeverj/NimShellCodeLoader
标签:#bypassav
GitHub
GitHub - aeverj/NimShellCodeLoader: 免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器 - aeverj/NimShellCodeLoader
GitHub监控消息提醒!!!
更新了:代码注入
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/congwa/openai-api-demos
标签:#代码注入
更新了:代码注入
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/congwa/openai-api-demos
标签:#代码注入
GitHub
GitHub - congwa/openai-api-demos: 📚 OpenAI API 完整功能演示项目,包含: • ChatGPT/GPT-4 对话 • DALL-E 图像生成 • Whisper 语音转换 • 文本嵌入搜索 • RAG 知识库系统…
📚 OpenAI API 完整功能演示项目,包含: • ChatGPT/GPT-4 对话 • DALL-E 图像生成 • Whisper 语音转换 • 文本嵌入搜索 • RAG 知识库系统 • Assistants API 应用 • 提示词工程最佳实践 🔥 特点: • 17个核心功能完整示例 • 异步处理最佳实践 • 详细的中文注释 • 完整的错误处理 • 生产级代码结构 🎯 适用于: ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-11680: Improper Authentication (CWE-287)
URL:https://github.com/famixcm/CVE-2024-11680
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-11680: Improper Authentication (CWE-287)
URL:https://github.com/famixcm/CVE-2024-11680
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:burp
描述:Python solutions to burpsuite academy labs
URL:https://github.com/Som3-b0dy/BurpAcademy
标签:#burp
更新了:burp
描述:Python solutions to burpsuite academy labs
URL:https://github.com/Som3-b0dy/BurpAcademy
标签:#burp
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-10542 Missing Authorization (CWE-862)
URL:https://github.com/FoKiiin/CVE-2024-10542
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-10542 Missing Authorization (CWE-862)
URL:https://github.com/FoKiiin/CVE-2024-10542
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-36401 GeoServer Remote Code Execution
URL:https://github.com/0x0d3ad/CVE-2024-36401
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-36401 GeoServer Remote Code Execution
URL:https://github.com/0x0d3ad/CVE-2024-36401
标签:#CVE-2024
GitHub
GitHub - 0x0d3ad/CVE-2024-36401: CVE-2024-36401 (GeoServer Remote Code Execution)
CVE-2024-36401 (GeoServer Remote Code Execution). Contribute to 0x0d3ad/CVE-2024-36401 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT
标签:#RCE
更新了:RCE
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT
标签:#RCE
GitHub
GitHub - K3ysTr0K3R/CVE-2024-10914-EXPLOIT: A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) - K3ysTr0K3R/CVE-2024-10914-EXPLOIT