GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service
URL:https://github.com/hotplugin0x01/CVE-2024-54679
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service
URL:https://github.com/hotplugin0x01/CVE-2024-54679
标签:#CVE-2024
GitHub
GitHub - hotplugin0x01/CVE-2024-54679: CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https://nvd.nist.gov/vuln/detail/CVE…
CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https://nvd.nist.gov/vuln/detail/CVE-2024-54679) - hotplugin0x01/CVE-2024-54679
GitHub监控消息提醒!!!
更新了:Red Team
描述:A simple tool designed to create Atomic Red Team tests with ease.
URL:https://github.com/krdmnbrk/atomicgen.io
标签:#Red Team
更新了:Red Team
描述:A simple tool designed to create Atomic Red Team tests with ease.
URL:https://github.com/krdmnbrk/atomicgen.io
标签:#Red Team
GitHub
GitHub - krdmnbrk/atomicgen.io: A simple tool designed to create Atomic Red Team tests with ease.
A simple tool designed to create Atomic Red Team tests with ease. - krdmnbrk/atomicgen.io
GitHub监控消息提醒!!!
更新了:RCE
描述:This framework is designed to assist penetration testers or developers in understanding the mechanics of remote code execution (RCE) exploitation.
URL:https://github.com/Jenderal92/RCE-Exploit-Framework
标签:#RCE
更新了:RCE
描述:This framework is designed to assist penetration testers or developers in understanding the mechanics of remote code execution (RCE) exploitation.
URL:https://github.com/Jenderal92/RCE-Exploit-Framework
标签:#RCE
GitHub
GitHub - Jenderal92/RCE-Exploit-Framework: This framework is designed to assist penetration testers or developers in understanding…
This framework is designed to assist penetration testers or developers in understanding the mechanics of remote code execution (RCE) exploitation. - Jenderal92/RCE-Exploit-Framework
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-12155 Missing Authorization (CWE-862)
URL:https://github.com/McTavishSue/CVE-2024-12155
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-12155 Missing Authorization (CWE-862)
URL:https://github.com/McTavishSue/CVE-2024-12155
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:反序列化
描述:辅助构造反序列化字符逃逸(半成品阶段)
URL:https://github.com/ph0ebus/php_unserialize_character_escape
标签:#反序列化
更新了:反序列化
描述:辅助构造反序列化字符逃逸(半成品阶段)
URL:https://github.com/ph0ebus/php_unserialize_character_escape
标签:#反序列化
GitHub
GitHub - ph0ebus/php_unserialize_character_escape: 辅助构造反序列化字符逃逸(半成品阶段)
辅助构造反序列化字符逃逸(半成品阶段). Contribute to ph0ebus/php_unserialize_character_escape development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team - Project 3
URL:https://github.com/392-f24/OpenHands
标签:#Red Team
更新了:Red Team
描述:Red Team - Project 3
URL:https://github.com/392-f24/OpenHands
标签:#Red Team
GitHub
GitHub - 392-f24/OpenHands: Red Team - Project 3
Red Team - Project 3. Contribute to 392-f24/OpenHands development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-52335: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
URL:https://github.com/cloudefence/CVE-2024-52335
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-52335: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
URL:https://github.com/cloudefence/CVE-2024-52335
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-10914 D-Link Remote Code Execution (RCE)
URL:https://github.com/redspy-sec/D-Link
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-10914 D-Link Remote Code Execution (RCE)
URL:https://github.com/redspy-sec/D-Link
标签:#CVE-2024
GitHub
GitHub - redspy-sec/D-Link: CVE-2024-10914 D-Link Remote Code Execution (RCE)
CVE-2024-10914 D-Link Remote Code Execution (RCE). Contribute to redspy-sec/D-Link development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11392
URL:https://github.com/Piyush-Bhor/CVE-2024-11392
标签:#CVE-2024
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11392
URL:https://github.com/Piyush-Bhor/CVE-2024-11392
标签:#CVE-2024
GitHub
GitHub - Piyush-Bhor/CVE-2024-11392: Technical Details and Exploit for CVE-2024-11392
Technical Details and Exploit for CVE-2024-11392. Contribute to Piyush-Bhor/CVE-2024-11392 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11394
URL:https://github.com/Piyush-Bhor/CVE-2024-11394
标签:#CVE-2024
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11394
URL:https://github.com/Piyush-Bhor/CVE-2024-11394
标签:#CVE-2024
GitHub
GitHub - Piyush-Bhor/CVE-2024-11394: Technical Details and Exploit for CVE-2024-11394
Technical Details and Exploit for CVE-2024-11394. Contribute to Piyush-Bhor/CVE-2024-11394 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:应急响应
描述:一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
URL:https://github.com/YuanBenSir/netstat-
标签:#应急响应
更新了:应急响应
描述:一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
URL:https://github.com/YuanBenSir/netstat-
标签:#应急响应
GitHub
GitHub - YuanBenSir/netstat_plus: 一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息 - YuanBenSir/netstat_plus
GitHub监控消息提醒!!!
更新了:应急响应
描述:一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
URL:https://github.com/YuanBenSir/netstat_plus
标签:#应急响应
更新了:应急响应
描述:一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
URL:https://github.com/YuanBenSir/netstat_plus
标签:#应急响应
GitHub
GitHub - YuanBenSir/netstat_plus: 一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息
一款适用于辅助Linux应急响应小工具,可优化输出netstat的结果,提取出外网IP、端口号、进程PID、进程名称、路径、状态等信息 - YuanBenSir/netstat_plus
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method
URL:https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI
标签:#CVE-2024
更新了:CVE-2024
描述:POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method
URL:https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI
标签:#CVE-2024
GitHub
GitHub - watchdog1337/CVE-2024-42327_Zabbix_SQLI: POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the…
POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method - watchdog1337/CVE-2024-42327_Zabbix_SQLI
GitHub监控消息提醒!!!
更新了:绕过
描述:APP渗透绕过反代理反证书检测
URL:https://github.com/chaos198800/APP-shen-tou-rao-guo-fan-dai-li-fan-zheng-shu-jian-ce
标签:#绕过
更新了:绕过
描述:APP渗透绕过反代理反证书检测
URL:https://github.com/chaos198800/APP-shen-tou-rao-guo-fan-dai-li-fan-zheng-shu-jian-ce
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11393
URL:https://github.com/Piyush-Bhor/CVE-2024-11393
标签:#CVE-2024
更新了:CVE-2024
描述:Technical Details and Exploit for CVE-2024-11393
URL:https://github.com/Piyush-Bhor/CVE-2024-11393
标签:#CVE-2024
GitHub
GitHub - Piyush-Bhor/CVE-2024-11393: Technical Details and Exploit for CVE-2024-11393
Technical Details and Exploit for CVE-2024-11393. Contribute to Piyush-Bhor/CVE-2024-11393 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/lengjingzju/jcore
标签:#代码注入
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/lengjingzju/jcore
标签:#代码注入
GitHub
GitHub - lengjingzju/jcore: JCore致力于提供C语言最实用的数据结构和实用工具:数据结构包含动态数组、动态字符串、链表、哈希表、位图、红黑树和优先级队列等;实用工具包含内存调试工具、数据结构生成工具、日志工具和线程池定时器等。
JCore致力于提供C语言最实用的数据结构和实用工具:数据结构包含动态数组、动态字符串、链表、哈希表、位图、红黑树和优先级队列等;实用工具包含内存调试工具、数据结构生成工具、日志工具和线程池定时器等。 - lengjingzju/jcore
GitHub监控消息提醒!!!
更新了:RCE
描述:Collecting RCE and SQL injection vulnerability reproduction
URL:https://github.com/CoolCoolTomato/FuckTheWorld
标签:#RCE
更新了:RCE
描述:Collecting RCE and SQL injection vulnerability reproduction
URL:https://github.com/CoolCoolTomato/FuckTheWorld
标签:#RCE
GitHub
CoolCoolTomato/FuckTheWorld
Collecting RCE and SQL injection vulnerability reproduction - CoolCoolTomato/FuckTheWorld
GitHub监控消息提醒!!!
更新了:hvv
描述:macOS上的小而美【Fofa、Shodan、Hunter、Zoomeye、Quake网络空间搜索引擎】闪电搜索器;GUI图形化(Mac/Windows)渗透测试信息搜集工具;资产搜集引擎;hw红队工具hvv
URL:https://github.com/Bug-Hunter-X/React-19--Concurrent-Mode-Conflicts-with-useSyncExternalStore-and-Asynchronous-Updates-9hvvn
标签:#hvv
更新了:hvv
描述:macOS上的小而美【Fofa、Shodan、Hunter、Zoomeye、Quake网络空间搜索引擎】闪电搜索器;GUI图形化(Mac/Windows)渗透测试信息搜集工具;资产搜集引擎;hw红队工具hvv
URL:https://github.com/Bug-Hunter-X/React-19--Concurrent-Mode-Conflicts-with-useSyncExternalStore-and-Asynchronous-Updates-9hvvn
标签:#hvv
GitHub
GitHub - Bug-Hunter-X/React-19--Concurrent-Mode-Conflicts-with-useSyncExternalStore-and-Asynchronous-Updates-9hvvn: React 19 Concurrent…
React 19 Concurrent Rendering Issues with External Stores: Unexpected UI updates or silent data corruption in complex components using useSyncExternalStore with legacy code or asynchronous operatio...
GitHub监控消息提醒!!!
更新了:反序列化
描述:Shiro反序列化漏洞综合利用工具
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-lou-dong-zong-he-li-yong-gong-ju
标签:#反序列化
更新了:反序列化
描述:Shiro反序列化漏洞综合利用工具
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-lou-dong-zong-he-li-yong-gong-ju
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof of concept of the CVE-2024-24549, Exploit in Python.
URL:https://github.com/JFOZ1010/CVE-2024-24549
标签:#CVE-2024
更新了:CVE-2024
描述:Proof of concept of the CVE-2024-24549, Exploit in Python.
URL:https://github.com/JFOZ1010/CVE-2024-24549
标签:#CVE-2024
GitHub
GitHub - JFOZ1010/CVE-2024-24549: Proof of concept of the CVE-2024-24549, Exploit in Python.
Proof of concept of the CVE-2024-24549, Exploit in Python. - GitHub - JFOZ1010/CVE-2024-24549: Proof of concept of the CVE-2024-24549, Exploit in Python.