GitHub监控消息提醒!!!
更新了:漏洞利用
描述:这个仓库收集了所有在 GitHub 上能找到的 CVE 漏洞利用工具。 This repository collects all CVE exploits found on GitHub.
URL:https://github.com/zxj-hub/CVE-2024-41713POC
标签:#漏洞利用
更新了:漏洞利用
描述:这个仓库收集了所有在 GitHub 上能找到的 CVE 漏洞利用工具。 This repository collects all CVE exploits found on GitHub.
URL:https://github.com/zxj-hub/CVE-2024-41713POC
标签:#漏洞利用
GitHub
GitHub - zxj-hub/CVE-2024-41713POC: Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在…
Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞,并且输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。影响范围:version < MiCollab 9...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/wubinworks/magento2-template-filter-patch
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/wubinworks/magento2-template-filter-patch
标签:#RCE
GitHub
GitHub - wubinworks/magento2-template-filter-patch: Magento 2 patch for CVE-2022-24086, CVE-2022-24087. Fix the RCE vulnerability…
Magento 2 patch for CVE-2022-24086, CVE-2022-24087. Fix the RCE vulnerability and related bugs by performing deep template variable escaping. If you cannot upgrade Magento or cannot apply the offic...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-56145 SSTI to RCE - twig templates
URL:https://github.com/Sachinart/CVE-2024-56145-craftcms-rce
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-56145 SSTI to RCE - twig templates
URL:https://github.com/Sachinart/CVE-2024-56145-craftcms-rce
标签:#CVE-2024
GitHub
GitHub - Sachinart/CVE-2024-56145-craftcms-rce: CVE-2024-56145 SSTI to RCE - twig templates
CVE-2024-56145 SSTI to RCE - twig templates . Contribute to Sachinart/CVE-2024-56145-craftcms-rce development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Pluck-CMS v4.7.18 RCE exploit
URL:https://github.com/xpltive/CVE-2023-50564
标签:#RCE
更新了:RCE
描述:Pluck-CMS v4.7.18 RCE exploit
URL:https://github.com/xpltive/CVE-2023-50564
标签:#RCE
GitHub
GitHub - xpltive/CVE-2023-50564: Pluck-CMS v4.7.18 RCE exploit
Pluck-CMS v4.7.18 RCE exploit. Contribute to xpltive/CVE-2023-50564 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Este projeto é uma ferramenta para scannear vulnerabilidades de Execução Remota de Código (RCE) em sites
URL:https://github.com/Israelzkn/Poison
标签:#RCE
更新了:RCE
描述:Este projeto é uma ferramenta para scannear vulnerabilidades de Execução Remota de Código (RCE) em sites
URL:https://github.com/Israelzkn/Poison
标签:#RCE
GitHub监控消息提醒!!!
更新了:getshell
描述:记一次tp5.0.24getshell1资源文件下载
URL:https://github.com/chaos198800/ji-yi-ci-tp5.0.24getshell1-zi-yuan-wen-jian-xia-zai
标签:#getshell
更新了:getshell
描述:记一次tp5.0.24getshell1资源文件下载
URL:https://github.com/chaos198800/ji-yi-ci-tp5.0.24getshell1-zi-yuan-wen-jian-xia-zai
标签:#getshell
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:tomcat CVE-2024-50379 条件竞争文件上传exp
URL:https://github.com/SleepingBag945/CVE-2024-50379
标签:#CVE-2024
更新了:CVE-2024
描述:tomcat CVE-2024-50379 条件竞争文件上传exp
URL:https://github.com/SleepingBag945/CVE-2024-50379
标签:#CVE-2024
GitHub
GitHub - SleepingBag945/CVE-2024-50379: tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp
tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp. Contribute to SleepingBag945/CVE-2024-50379 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-11349: Authentication Bypass Using an Alternate Path or Channel (CWE-288)
URL:https://github.com/linunyang/CVE-2024-11349
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-11349: Authentication Bypass Using an Alternate Path or Channel (CWE-288)
URL:https://github.com/linunyang/CVE-2024-11349
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-50379利用
URL:https://github.com/dear-cell/CVE-2024-50379
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-50379利用
URL:https://github.com/dear-cell/CVE-2024-50379
标签:#CVE-2024
GitHub
GitHub - dear-cell/CVE-2024-50379: CVE-2024-50379利用
CVE-2024-50379利用. Contribute to dear-cell/CVE-2024-50379 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit
URL:https://github.com/xpltive/CVE-2023-41425
标签:#RCE
更新了:RCE
描述:WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit
URL:https://github.com/xpltive/CVE-2023-41425
标签:#RCE
GitHub
GitHub - xpltive/CVE-2023-41425: WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit
WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit. Contribute to xpltive/CVE-2023-41425 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/ShinoMashiru/HIT-2022
标签:#代码注入
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/ShinoMashiru/HIT-2022
标签:#代码注入
GitHub
GitHub - ShinoMashiru/HIT-2022: HIT2022大数据分析实验,很烂,且参考了很多学长代码,勿喷,有能力自学自己写还是最好的。不过代码注释和报告写得还算详细吧,读起来应该比较方便,实在不会写代码当个入门教程看看也可以,感觉…
HIT2022大数据分析实验,很烂,且参考了很多学长代码,勿喷,有能力自学自己写还是最好的。不过代码注释和报告写得还算详细吧,读起来应该比较方便,实在不会写代码当个入门教程看看也可以,感觉网上mapreduce相关教程挺烂的,不知道别人都是怎么学的,不过和我一样没什么同专业朋友的话自学应该还是比较痛苦,有同学一起写可能好点。总之如果你觉得这些能帮到你的话就好,自认为注释和报告还算详细了。在忙...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Struts Vulnerability - CVE-2024-53677
URL:https://github.com/Q0LT/VM-CVE-2024-53677
标签:#CVE-2024
更新了:CVE-2024
描述:Struts Vulnerability - CVE-2024-53677
URL:https://github.com/Q0LT/VM-CVE-2024-53677
标签:#CVE-2024
GitHub
GitHub - Q0LT/VM-CVE-2024-53677: Struts Vulnerability - CVE-2024-53677
Struts Vulnerability - CVE-2024-53677. Contribute to Q0LT/VM-CVE-2024-53677 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE
URL:https://github.com/Harshit-Mashru/iTop-CVEs-exploit
标签:#RCE
更新了:RCE
描述:This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE
URL:https://github.com/Harshit-Mashru/iTop-CVEs-exploit
标签:#RCE
GitHub
GitHub - Harshit-Mashru/iTop-CVEs-exploit: This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that…
This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE - Harshit-Mashru/iTop-CVEs-exploit
GitHub监控消息提醒!!!
更新了:免杀
描述:可免杀火绒,360,Defender ,GW小绿球
URL:https://github.com/xiaogaojiayou/fscan---
标签:#免杀
更新了:免杀
描述:可免杀火绒,360,Defender ,GW小绿球
URL:https://github.com/xiaogaojiayou/fscan---
标签:#免杀
GitHub
GitHub - xiaogaojiayou/fscan---: 可免杀火绒,360,Defender ,GW小绿球
可免杀火绒,360,Defender ,GW小绿球. Contribute to xiaogaojiayou/fscan--- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-32113 PoC
URL:https://github.com/MikeyPPPPPPPP/CVE-2024-32113
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-32113 PoC
URL:https://github.com/MikeyPPPPPPPP/CVE-2024-32113
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team / Pentesting practice
URL:https://github.com/Mihindig/MITRE-ATT-CK-Persistence-Detection-with-Splunk-
标签:#Red Team
更新了:Red Team
描述:Red Team / Pentesting practice
URL:https://github.com/Mihindig/MITRE-ATT-CK-Persistence-Detection-with-Splunk-
标签:#Red Team
GitHub
GitHub - Mihindig/Detecting-Evil-with-Splunk-and-MITRE-ATT-CK: A practical cybersecurity project demonstrating MITRE ATT&CK mapping…
A practical cybersecurity project demonstrating MITRE ATT&CK mapping, Splunk queries, and Atomic Red Team tests. Simulates real-world attack techniques like BITS Job (T1197) and PowerShell ...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/H-9527/SOPlanning_exploit
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/H-9527/SOPlanning_exploit
标签:#RCE
GitHub
GitHub - H-9527/SOPlanning_exploit: To see if I can recreate the exploit scenario found on Exploit-DB. [SOPlanning 1.52.01 (Simple…
To see if I can recreate the exploit scenario found on Exploit-DB. [SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) ](https://www.exploit-db.com/explo...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/dragonXZH/CVE-2024-10914
标签:#CVE-2024
更新了:CVE-2024
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/dragonXZH/CVE-2024-10914
标签:#CVE-2024
GitHub
GitHub - dragonXZH/CVE-2024-10914: A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) - dragonXZH/CVE-2024-10914