GitHub监控消息提醒!!!
更新了:CVE-2024
描述:poc-CVE-2024-5057
URL:https://github.com/g1thubb004/poc-CVE-2024-5057
标签:#CVE-2024
更新了:CVE-2024
描述:poc-CVE-2024-5057
URL:https://github.com/g1thubb004/poc-CVE-2024-5057
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Red Team
描述:Collection of tools, code samples, and documentation to assist in AI Red Teaming
URL:https://github.com/aexcode/airt
标签:#Red Team
更新了:Red Team
描述:Collection of tools, code samples, and documentation to assist in AI Red Teaming
URL:https://github.com/aexcode/airt
标签:#Red Team
GitHub
GitHub - aexcode/airt: Collection of tools, code samples, and documentation to assist in AI Red Teaming
Collection of tools, code samples, and documentation to assist in AI Red Teaming - aexcode/airt
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.
URL:https://github.com/XiaomingX/cve-2024-51567-poc
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.
URL:https://github.com/XiaomingX/cve-2024-51567-poc
标签:#CVE-2024
GitHub
GitHub - XiaomingX/cve-2024-51567-poc: CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s…
CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections. - XiaomingX/cve-2024-51567-poc
GitHub监控消息提醒!!!
更新了:Red Team
描述:Interview Preparation for VATP || Penetration Testing ( Web, Mobile, API etc) || Cloud || SOC || Red Teaming || DevSecOps
URL:https://github.com/m14r41/CyberSecurity-Interview
标签:#Red Team
更新了:Red Team
描述:Interview Preparation for VATP || Penetration Testing ( Web, Mobile, API etc) || Cloud || SOC || Red Teaming || DevSecOps
URL:https://github.com/m14r41/CyberSecurity-Interview
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Event Tickets with Ticket Scanner WordPress 플러그인(CVE-2024-52427)의 불완전 패치 발견 및 권한 격하(Author → Contributor) 취약점 분석
URL:https://github.com/DoTTak/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report
标签:#CVE-2024
更新了:CVE-2024
描述:Event Tickets with Ticket Scanner WordPress 플러그인(CVE-2024-52427)의 불완전 패치 발견 및 권한 격하(Author → Contributor) 취약점 분석
URL:https://github.com/DoTTak/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team tools weaponized
URL:https://github.com/sneakerhax/Arsenal
标签:#Red Team
更新了:Red Team
描述:Red Team tools weaponized
URL:https://github.com/sneakerhax/Arsenal
标签:#Red Team
GitHub
GitHub - sneakerhax/Arsenal: Red Team tools weaponized
Red Team tools weaponized. Contribute to sneakerhax/Arsenal development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/jeecgboot/JeecgBoot
标签:#代码注入
更新了:代码注入
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/jeecgboot/JeecgBoot
标签:#代码注入
GitHub
GitHub - jeecgboot/JeecgBoot: 【AI低代码平台】AI low-code platform empowers enterprises to quickly develop low-code solutions and build…
【AI低代码平台】AI low-code platform empowers enterprises to quickly develop low-code solutions and build AI applications. 助力企业快速实现低代码开发和构建AI应用! AI应用平台涵盖:AI应用、AI模型、AI聊天助手、知识库、AI流程编排、MCP和插件,聊天式业务操作等。 强大代码...
GitHub监控消息提醒!!!
更新了:bypassav
描述:免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
URL:https://github.com/aeverj/NimShellCodeLoader
标签:#bypassav
更新了:bypassav
描述:免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
URL:https://github.com/aeverj/NimShellCodeLoader
标签:#bypassav
GitHub
GitHub - aeverj/NimShellCodeLoader: 免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器 - aeverj/NimShellCodeLoader
GitHub监控消息提醒!!!
更新了:代码注入
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/congwa/openai-api-demos
标签:#代码注入
更新了:代码注入
描述:【iOS应用安全、安全攻防】hook及越狱的基本防护与检测(动态库注入检测、hook检测与防护、越狱检测、签名校验、汇编分析、IDA反编译分析加密协议Demo);【数据传输安全】浅谈http、https与数据加密;代码加密&混淆;防抓包、http-dns解决方案,防止DNS劫持等
URL:https://github.com/congwa/openai-api-demos
标签:#代码注入
GitHub
GitHub - congwa/openai-api-demos: 📚 OpenAI API 完整功能演示项目,包含: • ChatGPT/GPT-4 对话 • DALL-E 图像生成 • Whisper 语音转换 • 文本嵌入搜索 • RAG 知识库系统…
📚 OpenAI API 完整功能演示项目,包含: • ChatGPT/GPT-4 对话 • DALL-E 图像生成 • Whisper 语音转换 • 文本嵌入搜索 • RAG 知识库系统 • Assistants API 应用 • 提示词工程最佳实践 🔥 特点: • 17个核心功能完整示例 • 异步处理最佳实践 • 详细的中文注释 • 完整的错误处理 • 生产级代码结构 🎯 适用于: ...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-11680: Improper Authentication (CWE-287)
URL:https://github.com/famixcm/CVE-2024-11680
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-11680: Improper Authentication (CWE-287)
URL:https://github.com/famixcm/CVE-2024-11680
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:burp
描述:Python solutions to burpsuite academy labs
URL:https://github.com/Som3-b0dy/BurpAcademy
标签:#burp
更新了:burp
描述:Python solutions to burpsuite academy labs
URL:https://github.com/Som3-b0dy/BurpAcademy
标签:#burp
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-10542 Missing Authorization (CWE-862)
URL:https://github.com/FoKiiin/CVE-2024-10542
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-10542 Missing Authorization (CWE-862)
URL:https://github.com/FoKiiin/CVE-2024-10542
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-36401 GeoServer Remote Code Execution
URL:https://github.com/0x0d3ad/CVE-2024-36401
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-36401 GeoServer Remote Code Execution
URL:https://github.com/0x0d3ad/CVE-2024-36401
标签:#CVE-2024
GitHub
GitHub - 0x0d3ad/CVE-2024-36401: CVE-2024-36401 (GeoServer Remote Code Execution)
CVE-2024-36401 (GeoServer Remote Code Execution). Contribute to 0x0d3ad/CVE-2024-36401 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT
标签:#RCE
更新了:RCE
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/K3ysTr0K3R/CVE-2024-10914-EXPLOIT
标签:#RCE
GitHub
GitHub - K3ysTr0K3R/CVE-2024-10914-EXPLOIT: A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) - K3ysTr0K3R/CVE-2024-10914-EXPLOIT
GitHub监控消息提醒!!!
更新了:红队
描述:一款红队在信息收集时规避IP封禁的傻瓜式一键代理池,通过大量代理节点轮询的代理池工具
URL:https://github.com/zidanfanshao/befree
标签:#红队
更新了:红队
描述:一款红队在信息收集时规避IP封禁的傻瓜式一键代理池,通过大量代理节点轮询的代理池工具
URL:https://github.com/zidanfanshao/befree
标签:#红队
GitHub
GitHub - zidanfanshao/befree: 一款红队在信息收集时规避IP封禁的傻瓜式一键代理池,通过大量代理节点轮询的代理池工具
一款红队在信息收集时规避IP封禁的傻瓜式一键代理池,通过大量代理节点轮询的代理池工具. Contribute to zidanfanshao/befree development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Rust for Hackers: a space to unlock the power of Rust in advanced Red Team techniques and offensive development.
URL:https://github.com/TaurusOmar/rustforhackers
标签:#Red Team
更新了:Red Team
描述:Rust for Hackers: a space to unlock the power of Rust in advanced Red Team techniques and offensive development.
URL:https://github.com/TaurusOmar/rustforhackers
标签:#Red Team
GitHub
GitHub - TaurusOmar/rustforhackers: Rust for Hackers: a space to unlock the power of Rust in advanced Red Team techniques and offensive…
Rust for Hackers: a space to unlock the power of Rust in advanced Red Team techniques and offensive development. - TaurusOmar/rustforhackers
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-11003 Perl Poc
URL:https://github.com/mtbdc-dy/CVE-2024-11003
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-11003 Perl Poc
URL:https://github.com/mtbdc-dy/CVE-2024-11003
标签:#CVE-2024
GitHub
GitHub - unknown-user-from/CVE-2024-11003-PoC: CVE-2024-11003 Perl Poc
CVE-2024-11003 Perl Poc. Contribute to unknown-user-from/CVE-2024-11003-PoC development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-11003 Perl Poc
URL:https://github.com/mtbdc-dy/CVE-2024-11003-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-11003 Perl Poc
URL:https://github.com/mtbdc-dy/CVE-2024-11003-PoC
标签:#CVE-2024
GitHub
GitHub - unknown-user-from/CVE-2024-11003-PoC: CVE-2024-11003 Perl Poc
CVE-2024-11003 Perl Poc. Contribute to unknown-user-from/CVE-2024-11003-PoC development by creating an account on GitHub.