GitHub监控消息提醒!!!
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/donald
标签:#CVE-2024
更新了:CVE-2024
描述:An example of a repo that would make use of the CVE-2024-32002
URL:https://github.com/jolibb55/donald
标签:#CVE-2024
GitHub
jolibb55/donald
An example of a repo that would make use of the CVE-2024-32002 - jolibb55/donald
GitHub监控消息提醒!!!
更新了:反序列化
描述:Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc
URL:https://github.com/0ATKX/Thinkphp-deserialization-POC-summary
标签:#反序列化
更新了:反序列化
描述:Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc
URL:https://github.com/0ATKX/Thinkphp-deserialization-POC-summary
标签:#反序列化
GitHub
GitHub - 0ATKX/Thinkphp-deserialization-POC-summary: Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc
Thinkphp5.0.24以及Thinkphp6的最新反序列化可用的poc. Contribute to 0ATKX/Thinkphp-deserialization-POC-summary development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:权限维持
描述:Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。
URL:https://github.com/Cherno-x/Redeemer-C2
标签:#权限维持
更新了:权限维持
描述:Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。
URL:https://github.com/Cherno-x/Redeemer-C2
标签:#权限维持
GitHub
GitHub - Cherno-x/Redeemer-C2: Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。
Redeemer C2是一款使用Rust编写的平台型C2,旨在滥用可信域名的API平台进行命令控制,用来对抗恶意域名巡查,是一款专注于权限维持的C2工具。 - Cherno-x/Redeemer-C2
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC
标签:#CVE-2024
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC
标签:#CVE-2024
GitHub
GitHub - TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC: This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE…
This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This noscript automates the exploitation process, including payload creation, chunked deliver...
GitHub监控消息提醒!!!
更新了:漏洞扫描
描述:Nuclei 分布式漏洞扫描平台可联动 AssetsDetectAPI 资产搜集
URL:https://github.com/evilc0deooo/NucleiPlatform
标签:#漏洞扫描
更新了:漏洞扫描
描述:Nuclei 分布式漏洞扫描平台可联动 AssetsDetectAPI 资产搜集
URL:https://github.com/evilc0deooo/NucleiPlatform
标签:#漏洞扫描
GitHub
GitHub - evilc0deooo/NucleiSaas: Nuclei SaaS 化服务漏洞扫描平台
Nuclei SaaS 化服务漏洞扫描平台. Contribute to evilc0deooo/NucleiSaas development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit
标签:#CVE-2024
更新了:CVE-2024
描述:Vulnerabilidad CVE-2024-24926 afecta al tema Brooklyn de WordPress
URL:https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit
标签:#CVE-2024
GitHub
GitHub - D3N14LD15K/CVE-2024-11680_PoC_Exploit: This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a…
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw d...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-4956 Python exploitation utility
URL:https://github.com/XiaomingX/cve-2024-4956
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-4956 Python exploitation utility
URL:https://github.com/XiaomingX/cve-2024-4956
标签:#CVE-2024
GitHub
GitHub - XiaomingX/cve-2024-4956: CVE-2024-4956 Python exploitation utility
CVE-2024-4956 Python exploitation utility. Contribute to XiaomingX/cve-2024-4956 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:s2-067(CVE-2024-53677)
URL:https://github.com/cloudwafs/s2-067-CVE-2024-53677
标签:#CVE-2024
更新了:CVE-2024
描述:s2-067(CVE-2024-53677)
URL:https://github.com/cloudwafs/s2-067-CVE-2024-53677
标签:#CVE-2024
GitHub
GitHub - cloudwafs/s2-067-CVE-2024-53677: s2-067(CVE-2024-53677)
s2-067(CVE-2024-53677). Contribute to cloudwafs/s2-067-CVE-2024-53677 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)
URL:https://github.com/soltanali0/CVE-2024-38475
标签:#CVE-2024
更新了:CVE-2024
描述:exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)
URL:https://github.com/soltanali0/CVE-2024-38475
标签:#CVE-2024
GitHub
GitHub - soltanali0/CVE-2024-38475: exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)
exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching) - soltanali0/CVE-2024-38475
GitHub监控消息提醒!!!
更新了:RCE
描述:client-server chat using socketserver (server has RCE on clients)
URL:https://github.com/Sekiro19/NetBox
标签:#RCE
更新了:RCE
描述:client-server chat using socketserver (server has RCE on clients)
URL:https://github.com/Sekiro19/NetBox
标签:#RCE
GitHub
GitHub - Sekiro19/NetBox: client-server chat + file transfer using socketserver (server has RCE on clients)
client-server chat + file transfer using socketserver (server has RCE on clients) - Sekiro19/NetBox
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE
URL:https://github.com/JAckLosingHeart/CVE-2024-55875
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE
URL:https://github.com/JAckLosingHeart/CVE-2024-55875
标签:#CVE-2024
GitHub
GitHub - JAckLosingHeart/CVE-2024-55875: CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE
CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE - JAckLosingHeart/CVE-2024-55875
GitHub监控消息提醒!!!
更新了:渗透测试
描述:一个个人博客,博客会定期更新。写了vpn,服务器,vpn,梯子怎么找。渗透测试找工作。
URL:https://github.com/shangtianci12345/shangtianci12345.github.io
标签:#渗透测试
更新了:渗透测试
描述:一个个人博客,博客会定期更新。写了vpn,服务器,vpn,梯子怎么找。渗透测试找工作。
URL:https://github.com/shangtianci12345/shangtianci12345.github.io
标签:#渗透测试
GitHub
GitHub - shangtianci12345/shangtianci12345.github.io: 在github上面搭建的博客,里面会定期更新。里面详细写了我是怎么找到vps,服务器,vpn,梯子的,渗透测试怎么找工作\-----------…
在github上面搭建的博客,里面会定期更新。里面详细写了我是怎么找到vps,服务器,vpn,梯子的,渗透测试怎么找工作\---------------------------------------↑↑↑↑↑↑请帮我点个star(⁄ ⁄•⁄ω⁄•⁄ ⁄)♡↑↑↑↑↑↑↑ - shangtianci12345/shangtianci12345.github.io
GitHub监控消息提醒!!!
更新了:Red Team
描述:Participation kit for the SATML 2025 DocVQA Red Team Competition
URL:https://github.com/andreybarsky/pdocvqa_satml
标签:#Red Team
更新了:Red Team
描述:Participation kit for the SATML 2025 DocVQA Red Team Competition
URL:https://github.com/andreybarsky/pdocvqa_satml
标签:#Red Team
GitHub
GitHub - andreybarsky/pdocvqa_satml: Participation kit for the SATML 2025 DocVQA Red Team Competition
Participation kit for the SATML 2025 DocVQA Red Team Competition - andreybarsky/pdocvqa_satml
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection
URL:https://github.com/TAM-K592/CVE-2024-53677-S2-067
标签:#CVE-2024
更新了:CVE-2024
描述:Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection
URL:https://github.com/TAM-K592/CVE-2024-53677-S2-067
标签:#CVE-2024
GitHub
GitHub - TAM-K592/CVE-2024-53677-S2-067: A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts…
A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises fr...
GitHub监控消息提醒!!!
更新了:RCE
描述:Este projeto é uma ferramenta para scannear vulnerabilidades de Execução Remota de Código (RCE) em sites
URL:https://github.com/Israelxyzz/RCE
标签:#RCE
更新了:RCE
描述:Este projeto é uma ferramenta para scannear vulnerabilidades de Execução Remota de Código (RCE) em sites
URL:https://github.com/Israelxyzz/RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Este projeto é uma ferramenta para scannear vulnerabilidades de Execução Remota de Código (RCE) em sites
URL:https://github.com/Israelxyzz/Poison
标签:#RCE
更新了:RCE
描述:Este projeto é uma ferramenta para scannear vulnerabilidades de Execução Remota de Código (RCE) em sites
URL:https://github.com/Israelxyzz/Poison
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述: The CVE-2024-46982 is cache poisoning of next_js some site have API to load their image
URL:https://github.com/CodePontiff/next_js_poisoning
标签:#CVE-2024
更新了:CVE-2024
描述: The CVE-2024-46982 is cache poisoning of next_js some site have API to load their image
URL:https://github.com/CodePontiff/next_js_poisoning
标签:#CVE-2024
GitHub
GitHub - CodePontiff/next_js_poisoning: The CVE-2024-46982 is cache poisoning of next_js some site have API to load their image
The CVE-2024-46982 is cache poisoning of next_js some site have API to load their image - CodePontiff/next_js_poisoning