GitHub监控消息提醒!!!
更新了:CVE-2024
描述:This is an exploit for chemistry Hack the Box machines that automates a \"terminal\" enviornment using CVE-2024-23346
URL:https://github.com/MAWK0235/CVE-2024-23346
标签:#CVE-2024
更新了:CVE-2024
描述:This is an exploit for chemistry Hack the Box machines that automates a \"terminal\" enviornment using CVE-2024-23346
URL:https://github.com/MAWK0235/CVE-2024-23346
标签:#CVE-2024
GitHub
GitHub - MAWK0235/CVE-2024-23346: This is an exploit for CVE-2024-23346 that acts as a "terminal" (tested on chemistry.htb)
This is an exploit for CVE-2024-23346 that acts as a "terminal" (tested on chemistry.htb) - MAWK0235/CVE-2024-23346
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Repository for archiving Cobalt Strike configuration
URL:https://github.com/ncav/ThreatFox_Reporter.py
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Repository for archiving Cobalt Strike configuration
URL:https://github.com/ncav/ThreatFox_Reporter.py
标签:#Cobalt Strike
GitHub
GitHub - ncav/ThreatFox_Reporter.py: This python noscript will query Shodan for product cobalt strike. From those results, the noscript…
This python noscript will query Shodan for product cobalt strike. From those results, the noscript will search ThreatFox ip database for any matches. If there are no matches, the new IP address will be...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Towson University Red Team Kaiju Toolkit for Case Studies 2025
URL:https://github.com/megatop1/CaseStudiesKaiju-2025
标签:#Red Team
更新了:Red Team
描述:Towson University Red Team Kaiju Toolkit for Case Studies 2025
URL:https://github.com/megatop1/CaseStudiesKaiju-2025
标签:#Red Team
GitHub监控消息提醒!!!
更新了:漏洞检测
描述:这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)
URL:https://github.com/Weijin-wj/XXECheck
标签:#漏洞检测
更新了:漏洞检测
描述:这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)
URL:https://github.com/Weijin-wj/XXECheck
标签:#漏洞检测
GitHub
GitHub - Weijin-wj/XXECheck: 这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)
这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool) - Weijin-wj/XXECheck
GitHub监控消息提醒!!!
更新了:webshell
描述:Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools such as PHPsert webshells, mimCN utilities and Visual Studio Code tunnels.
URL:https://github.com/sl33pydata/Operation_Digital_Eye
标签:#webshell
更新了:webshell
描述:Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools such as PHPsert webshells, mimCN utilities and Visual Studio Code tunnels.
URL:https://github.com/sl33pydata/Operation_Digital_Eye
标签:#webshell
GitHub
GitHub - sl33pydata/Operation_Digital_Eye: Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools…
Operation Digital Eye is a targeted cyber-espionage campaign leveraging custom tools such as PHPsert webshells, mimCN utilities and Visual Studio Code tunnels. - GitHub - sl33pydata/Operation_Digi...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/moften/CVE-2024-24926
标签:#CVE-2024
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/moften/CVE-2024-24926
标签:#CVE-2024
GitHub
GitHub - moften/CVE-2024-24926: Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress - moften/CVE-2024-24926
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-55557
URL:https://github.com/partywavesec/CVE-2024-55557
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-55557
URL:https://github.com/partywavesec/CVE-2024-55557
标签:#CVE-2024
GitHub
GitHub - partywavesec/CVE-2024-55557: CVE-2024-55557
CVE-2024-55557. Contribute to partywavesec/CVE-2024-55557 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Palo Alto Networks PAN-OS(CVE-2024-9474) POC
URL:https://github.com/coskper-papa/PAN-OS_CVE-2024-9474
标签:#CVE-2024
更新了:CVE-2024
描述:Palo Alto Networks PAN-OS(CVE-2024-9474) POC
URL:https://github.com/coskper-papa/PAN-OS_CVE-2024-9474
标签:#CVE-2024
GitHub
GitHub - coskper-papa/PAN-OS_CVE-2024-9474: Palo Alto Networks PAN-OS(CVE-2024-9474) POC
Palo Alto Networks PAN-OS(CVE-2024-9474) POC. Contribute to coskper-papa/PAN-OS_CVE-2024-9474 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/CVE-2024-32002_RCE
标签:#CVE-2024
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/CVE-2024-32002_RCE
标签:#CVE-2024
GitHub
GitHub - jolibb55/CVE-2024-32002_RCE: Exploit PoC for CVE-2024-32002
Exploit PoC for CVE-2024-32002. Contribute to jolibb55/CVE-2024-32002_RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:钓鱼
描述:开源版三链提币接口/提币钓鱼系统/TG机器人通知/阈值拦截
URL:https://github.com/official-sourcecode/kai_yuan_ban_san_lian_a
标签:#钓鱼
更新了:钓鱼
描述:开源版三链提币接口/提币钓鱼系统/TG机器人通知/阈值拦截
URL:https://github.com/official-sourcecode/kai_yuan_ban_san_lian_a
标签:#钓鱼
GitHub
GitHub - official-sourcecode/kai_yuan_ban_san_lian_a: 开源版三链提币接口/提币钓鱼系统/TG机器人通知/阈值拦截
开源版三链提币接口/提币钓鱼系统/TG机器人通知/阈值拦截. Contribute to official-sourcecode/kai_yuan_ban_san_lian_a development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/donald
标签:#CVE-2024
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/donald
标签:#CVE-2024
GitHub
jolibb55/donald
An example of a repo that would make use of the CVE-2024-32002 - jolibb55/donald
GitHub监控消息提醒!!!
更新了:反序列化
描述:Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc
URL:https://github.com/0ATKX/Thinkphp-deserialization-POC-summary
标签:#反序列化
更新了:反序列化
描述:Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc
URL:https://github.com/0ATKX/Thinkphp-deserialization-POC-summary
标签:#反序列化
GitHub
GitHub - 0ATKX/Thinkphp-deserialization-POC-summary: Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc
Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc. Contribute to 0ATKX/Thinkphp-deserialization-POC-summary development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:权限维持
描述:Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。
URL:https://github.com/Cherno-x/Redeemer-C2
标签:#权限维持
更新了:权限维持
描述:Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。
URL:https://github.com/Cherno-x/Redeemer-C2
标签:#权限维持
GitHub
GitHub - Cherno-x/Redeemer-C2: Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。
Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。 - Cherno-x/Redeemer-C2
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC
标签:#CVE-2024
GitHub
GitHub - TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC: This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE…
This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This noscript automates the exploitation process, including payload creation, chunked deliver...
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:Nuclei 分布式漏洞扫描平台可联动 AssetsDetectAPI 资产搜集
URL:https://github.com/evilc0deooo/NucleiPlatform
标签:#漏洞扫描
更新了:漏洞扫描
描述:Nuclei 分布式漏洞扫描平台可联动 AssetsDetectAPI 资产搜集
URL:https://github.com/evilc0deooo/NucleiPlatform
标签:#漏洞扫描
GitHub
GitHub - evilc0deooo/NucleiSaas: Nuclei SaaS 化服务漏洞扫描平台
Nuclei SaaS 化服务漏洞扫描平台. Contribute to evilc0deooo/NucleiSaas development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit
标签:#CVE-2024
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit
标签:#CVE-2024
GitHub
GitHub - D3N14LD15K/CVE-2024-11680_PoC_Exploit: This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a…
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw d...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4956 Python exploitation utility
URL:https://github.com/XiaomingX/cve-2024-4956
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4956 Python exploitation utility
URL:https://github.com/XiaomingX/cve-2024-4956
标签:#CVE-2024
GitHub
GitHub - XiaomingX/cve-2024-4956: CVE-2024-4956 Python exploitation utility
CVE-2024-4956 Python exploitation utility. Contribute to XiaomingX/cve-2024-4956 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:s2-067(CVE-2024-53677)
URL:https://github.com/cloudwafs/s2-067-CVE-2024-53677
标签:#CVE-2024
更新了:CVE-2024
描述:s2-067(CVE-2024-53677)
URL:https://github.com/cloudwafs/s2-067-CVE-2024-53677
标签:#CVE-2024
GitHub
GitHub - cloudwafs/s2-067-CVE-2024-53677: s2-067(CVE-2024-53677)
s2-067(CVE-2024-53677). Contribute to cloudwafs/s2-067-CVE-2024-53677 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)
URL:https://github.com/soltanali0/CVE-2024-38475
标签:#CVE-2024
更新了:CVE-2024
描述:exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)
URL:https://github.com/soltanali0/CVE-2024-38475
标签:#CVE-2024
GitHub
GitHub - soltanali0/CVE-2024-38475: exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)
exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching) - soltanali0/CVE-2024-38475