GitHub监控消息提醒!!!
更新了:RCE
描述:This is PoC of RCE and DoS exploits for @calcubot telegram bot.
URL:https://github.com/artxdev0/calcubot_rce_poc
标签:#RCE
更新了:RCE
描述:This is PoC of RCE and DoS exploits for @calcubot telegram bot.
URL:https://github.com/artxdev0/calcubot_rce_poc
标签:#RCE
GitHub
GitHub - arttttx/calcubot_rce_poc: This is PoC of RCE and DoS exploits for @calcubot telegram bot.
This is PoC of RCE and DoS exploits for @calcubot telegram bot. - arttttx/calcubot_rce_poc
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:An experimental COFF loader for executing Cobalt Strike Beacon Object Files (BOFs)
URL:https://github.com/soheil-01/coff_loader
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:An experimental COFF loader for executing Cobalt Strike Beacon Object Files (BOFs)
URL:https://github.com/soheil-01/coff_loader
标签:#Cobalt Strike
GitHub
GitHub - soheil-01/coff_loader: An experimental COFF loader for executing Cobalt Strike Beacon Object Files (BOFs)
An experimental COFF loader for executing Cobalt Strike Beacon Object Files (BOFs) - soheil-01/coff_loader
GitHub监控消息提醒!!!
更新了:钓鱼
描述:Block X's ads, intercept phishing and fraud information in X.屏蔽X的广告、拦截X中的钓鱼信息和诈骗信息。
URL:https://github.com/0xSingularityLab/X-Shield
标签:#钓鱼
更新了:钓鱼
描述:Block X's ads, intercept phishing and fraud information in X.屏蔽X的广告、拦截X中的钓鱼信息和诈骗信息。
URL:https://github.com/0xSingularityLab/X-Shield
标签:#钓鱼
GitHub
GitHub - 0xSingularityLab/X-Shield: Block X's ads, intercept phishing and fraud information in X.屏蔽X的广告、拦截X中的钓鱼信息和诈骗信息。
Block X's ads, intercept phishing and fraud information in X.屏蔽X的广告、拦截X中的钓鱼信息和诈骗信息。 - 0xSingularityLab/X-Shield
👍1
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-9465 Proof of Concept
URL:https://github.com/Farzan-Kh/CVE-2024-9465
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-9465 Proof of Concept
URL:https://github.com/Farzan-Kh/CVE-2024-9465
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-9465 Proof of Concept
URL:https://github.com/L41KAA/CVE-2024-48705
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-9465 Proof of Concept
URL:https://github.com/L41KAA/CVE-2024-48705
标签:#CVE-2024
GitHub
GitHub - L41KAA/CVE-2024-48705: Wavlink AC1200 with firmware versions M32A3_V1410_230602 and M32A3_V1410_240222 are vulnerable…
Wavlink AC1200 with firmware versions M32A3_V1410_230602 and M32A3_V1410_240222 are vulnerable to a post-authentication command injection while resetting the password. This vulnerability is specifi...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This repository presents a proof-of-concept of CVE-2024-50677
URL:https://github.com/ZumiYumi/CVE-2024-50677
标签:#CVE-2024
更新了:CVE-2024
描述:This repository presents a proof-of-concept of CVE-2024-50677
URL:https://github.com/ZumiYumi/CVE-2024-50677
标签:#CVE-2024
GitHub
GitHub - ZumiYumi/CVE-2024-50677: This repository presents a proof-of-concept of CVE-2024-50677
This repository presents a proof-of-concept of CVE-2024-50677 - ZumiYumi/CVE-2024-50677
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service
URL:https://github.com/hotplugin0x01/CVE-2024-54679
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service
URL:https://github.com/hotplugin0x01/CVE-2024-54679
标签:#CVE-2024
GitHub
GitHub - hotplugin0x01/CVE-2024-54679: CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https://nvd.nist.gov/vuln/detail/CVE…
CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https://nvd.nist.gov/vuln/detail/CVE-2024-54679) - hotplugin0x01/CVE-2024-54679
GitHub监控消息提醒!!!
更新了:Red Team
描述:A simple tool designed to create Atomic Red Team tests with ease.
URL:https://github.com/krdmnbrk/atomicgen.io
标签:#Red Team
更新了:Red Team
描述:A simple tool designed to create Atomic Red Team tests with ease.
URL:https://github.com/krdmnbrk/atomicgen.io
标签:#Red Team
GitHub
GitHub - krdmnbrk/atomicgen.io: A simple tool designed to create Atomic Red Team tests with ease.
A simple tool designed to create Atomic Red Team tests with ease. - krdmnbrk/atomicgen.io
GitHub监控消息提醒!!!
更新了:RCE
描述:This framework is designed to assist penetration testers or developers in understanding the mechanics of remote code execution (RCE) exploitation.
URL:https://github.com/Jenderal92/RCE-Exploit-Framework
标签:#RCE
更新了:RCE
描述:This framework is designed to assist penetration testers or developers in understanding the mechanics of remote code execution (RCE) exploitation.
URL:https://github.com/Jenderal92/RCE-Exploit-Framework
标签:#RCE
GitHub
GitHub - Jenderal92/RCE-Exploit-Framework: This framework is designed to assist penetration testers or developers in understanding…
This framework is designed to assist penetration testers or developers in understanding the mechanics of remote code execution (RCE) exploitation. - Jenderal92/RCE-Exploit-Framework
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-12155 Missing Authorization (CWE-862)
URL:https://github.com/McTavishSue/CVE-2024-12155
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-12155 Missing Authorization (CWE-862)
URL:https://github.com/McTavishSue/CVE-2024-12155
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:反序列化
描述:辅助构造反序列化字符逃逸(半成品阶段)
URL:https://github.com/ph0ebus/php_unserialize_character_escape
标签:#反序列化
更新了:反序列化
描述:辅助构造反序列化字符逃逸(半成品阶段)
URL:https://github.com/ph0ebus/php_unserialize_character_escape
标签:#反序列化
GitHub
GitHub - ph0ebus/php_unserialize_character_escape: 辅助构造反序列化字符逃逸(半成品阶段)
辅助构造反序列化字符逃逸(半成品阶段). Contribute to ph0ebus/php_unserialize_character_escape development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team - Project 3
URL:https://github.com/392-f24/OpenHands
标签:#Red Team
更新了:Red Team
描述:Red Team - Project 3
URL:https://github.com/392-f24/OpenHands
标签:#Red Team
GitHub
GitHub - 392-f24/OpenHands: Red Team - Project 3
Red Team - Project 3. Contribute to 392-f24/OpenHands development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-52335: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
URL:https://github.com/cloudefence/CVE-2024-52335
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-52335: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
URL:https://github.com/cloudefence/CVE-2024-52335
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-10914 D-Link Remote Code Execution (RCE)
URL:https://github.com/redspy-sec/D-Link
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-10914 D-Link Remote Code Execution (RCE)
URL:https://github.com/redspy-sec/D-Link
标签:#CVE-2024
GitHub
GitHub - redspy-sec/D-Link: CVE-2024-10914 D-Link Remote Code Execution (RCE)
CVE-2024-10914 D-Link Remote Code Execution (RCE). Contribute to redspy-sec/D-Link development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11392
URL:https://github.com/Piyush-Bhor/CVE-2024-11392
标签:#CVE-2024
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11392
URL:https://github.com/Piyush-Bhor/CVE-2024-11392
标签:#CVE-2024
GitHub
GitHub - Piyush-Bhor/CVE-2024-11392: Technical Details and Exploit for CVE-2024-11392
Technical Details and Exploit for CVE-2024-11392. Contribute to Piyush-Bhor/CVE-2024-11392 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11394
URL:https://github.com/Piyush-Bhor/CVE-2024-11394
标签:#CVE-2024
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11394
URL:https://github.com/Piyush-Bhor/CVE-2024-11394
标签:#CVE-2024
GitHub
GitHub - Piyush-Bhor/CVE-2024-11394: Technical Details and Exploit for CVE-2024-11394
Technical Details and Exploit for CVE-2024-11394. Contribute to Piyush-Bhor/CVE-2024-11394 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
URL:https://github.com/YuanBenSir/netstat-
标签:#应急响应
更新了:应急响应
描述:一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
URL:https://github.com/YuanBenSir/netstat-
标签:#应急响应
GitHub
GitHub - YuanBenSir/netstat_plus: 一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息 - YuanBenSir/netstat_plus
GitHub监控消息提醒!!!
更新了:应急响应
描述:一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
URL:https://github.com/YuanBenSir/netstat_plus
标签:#应急响应
更新了:应急响应
描述:一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
URL:https://github.com/YuanBenSir/netstat_plus
标签:#应急响应
GitHub
GitHub - YuanBenSir/netstat_plus: 一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息 - YuanBenSir/netstat_plus
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method
URL:https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI
标签:#CVE-2024
更新了:CVE-2024
描述:POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method
URL:https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI
标签:#CVE-2024
GitHub
GitHub - watchdog1337/CVE-2024-42327_Zabbix_SQLI: POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the…
POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method - watchdog1337/CVE-2024-42327_Zabbix_SQLI