GitHub监控消息提醒!!!
更新了:RCE
描述:Este projeto é uma ferramenta para scannear vulnerabilidades de Execução Remota de Código (RCE) em sites
URL:https://github.com/Israelzkn/Poison
标签:#RCE
更新了:RCE
描述:Este projeto é uma ferramenta para scannear vulnerabilidades de Execução Remota de Código (RCE) em sites
URL:https://github.com/Israelzkn/Poison
标签:#RCE
GitHub监控消息提醒!!!
更新了:getshell
描述:记一次tp5.0.24getshell1资源文件下载
URL:https://github.com/chaos198800/ji-yi-ci-tp5.0.24getshell1-zi-yuan-wen-jian-xia-zai
标签:#getshell
更新了:getshell
描述:记一次tp5.0.24getshell1资源文件下载
URL:https://github.com/chaos198800/ji-yi-ci-tp5.0.24getshell1-zi-yuan-wen-jian-xia-zai
标签:#getshell
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:tomcat CVE-2024-50379 条件竞争文件上传exp
URL:https://github.com/SleepingBag945/CVE-2024-50379
标签:#CVE-2024
更新了:CVE-2024
描述:tomcat CVE-2024-50379 条件竞争文件上传exp
URL:https://github.com/SleepingBag945/CVE-2024-50379
标签:#CVE-2024
GitHub
GitHub - SleepingBag945/CVE-2024-50379: tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp
tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp. Contribute to SleepingBag945/CVE-2024-50379 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-11349: Authentication Bypass Using an Alternate Path or Channel (CWE-288)
URL:https://github.com/linunyang/CVE-2024-11349
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-11349: Authentication Bypass Using an Alternate Path or Channel (CWE-288)
URL:https://github.com/linunyang/CVE-2024-11349
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-50379利用
URL:https://github.com/dear-cell/CVE-2024-50379
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-50379利用
URL:https://github.com/dear-cell/CVE-2024-50379
标签:#CVE-2024
GitHub
GitHub - dear-cell/CVE-2024-50379: CVE-2024-50379利用
CVE-2024-50379利用. Contribute to dear-cell/CVE-2024-50379 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit
URL:https://github.com/xpltive/CVE-2023-41425
标签:#RCE
更新了:RCE
描述:WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit
URL:https://github.com/xpltive/CVE-2023-41425
标签:#RCE
GitHub
GitHub - xpltive/CVE-2023-41425: WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit
WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit. Contribute to xpltive/CVE-2023-41425 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/ShinoMashiru/HIT-2022
标签:#代码注入
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/ShinoMashiru/HIT-2022
标签:#代码注入
GitHub
GitHub - ShinoMashiru/HIT-2022: HIT2022大数据分析实验,很烂,且参考了很多学长代码,勿喷,有能力自学自己写还是最好的。不过代码注释和报告写得还算详细吧,读起来应该比较方便,实在不会写代码当个入门教程看看也可以,感觉…
HIT2022大数据分析实验,很烂,且参考了很多学长代码,勿喷,有能力自学自己写还是最好的。不过代码注释和报告写得还算详细吧,读起来应该比较方便,实在不会写代码当个入门教程看看也可以,感觉网上mapreduce相关教程挺烂的,不知道别人都是怎么学的,不过和我一样没什么同专业朋友的话自学应该还是比较痛苦,有同学一起写可能好点。总之如果你觉得这些能帮到你的话就好,自认为注释和报告还算详细了。在忙...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Struts Vulnerability - CVE-2024-53677
URL:https://github.com/Q0LT/VM-CVE-2024-53677
标签:#CVE-2024
更新了:CVE-2024
描述:Struts Vulnerability - CVE-2024-53677
URL:https://github.com/Q0LT/VM-CVE-2024-53677
标签:#CVE-2024
GitHub
GitHub - Q0LT/VM-CVE-2024-53677: Struts Vulnerability - CVE-2024-53677
Struts Vulnerability - CVE-2024-53677. Contribute to Q0LT/VM-CVE-2024-53677 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE
URL:https://github.com/Harshit-Mashru/iTop-CVEs-exploit
标签:#RCE
更新了:RCE
描述:This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE
URL:https://github.com/Harshit-Mashru/iTop-CVEs-exploit
标签:#RCE
GitHub
GitHub - Harshit-Mashru/iTop-CVEs-exploit: This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that…
This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE - Harshit-Mashru/iTop-CVEs-exploit
GitHub监控消息提醒!!!
更新了:免杀
描述:可免杀火绒,360,Defender ,GW小绿球
URL:https://github.com/xiaogaojiayou/fscan---
标签:#免杀
更新了:免杀
描述:可免杀火绒,360,Defender ,GW小绿球
URL:https://github.com/xiaogaojiayou/fscan---
标签:#免杀
GitHub
GitHub - xiaogaojiayou/fscan---: 可免杀火绒,360,Defender ,GW小绿球
可免杀火绒,360,Defender ,GW小绿球. Contribute to xiaogaojiayou/fscan--- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-32113 PoC
URL:https://github.com/MikeyPPPPPPPP/CVE-2024-32113
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-32113 PoC
URL:https://github.com/MikeyPPPPPPPP/CVE-2024-32113
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team / Pentesting practice
URL:https://github.com/Mihindig/MITRE-ATT-CK-Persistence-Detection-with-Splunk-
标签:#Red Team
更新了:Red Team
描述:Red Team / Pentesting practice
URL:https://github.com/Mihindig/MITRE-ATT-CK-Persistence-Detection-with-Splunk-
标签:#Red Team
GitHub
GitHub - Mihindig/Detecting-Evil-with-Splunk-and-MITRE-ATT-CK: A practical cybersecurity project demonstrating MITRE ATT&CK mapping…
A practical cybersecurity project demonstrating MITRE ATT&CK mapping, Splunk queries, and Atomic Red Team tests. Simulates real-world attack techniques like BITS Job (T1197) and PowerShell ...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/H-9527/SOPlanning_exploit
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/H-9527/SOPlanning_exploit
标签:#RCE
GitHub
GitHub - H-9527/SOPlanning_exploit: To see if I can recreate the exploit scenario found on Exploit-DB. [SOPlanning 1.52.01 (Simple…
To see if I can recreate the exploit scenario found on Exploit-DB. [SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) ](https://www.exploit-db.com/explo...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/dragonXZH/CVE-2024-10914
标签:#CVE-2024
更新了:CVE-2024
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/dragonXZH/CVE-2024-10914
标签:#CVE-2024
GitHub
GitHub - dragonXZH/CVE-2024-10914: A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) - dragonXZH/CVE-2024-10914
GitHub监控消息提醒!!!
更新了:webshell
描述:A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.
URL:https://github.com/LT-lanthau/Webshell
标签:#webshell
更新了:webshell
描述:A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.
URL:https://github.com/LT-lanthau/Webshell
标签:#webshell
GitHub
GitHub - LT-lanthau/Webshell: A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.
A collection of webshells for learning only. All forms of misuse and violations are not our responsibility. - LT-lanthau/Webshell
GitHub监控消息提醒!!!
更新了:反序列化
描述:Shiro反序列化工具-加强版
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-gong-ju---jia-qiang-ban
标签:#反序列化
更新了:反序列化
描述:Shiro反序列化工具-加强版
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-gong-ju---jia-qiang-ban
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module
URL:https://github.com/BOl1o/CVE-2024-49112-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module
URL:https://github.com/BOl1o/CVE-2024-49112-PoC
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-50379-exp
URL:https://github.com/lizhianyuguangming/CVE-2024-50379-exp
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-50379-exp
URL:https://github.com/lizhianyuguangming/CVE-2024-50379-exp
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本
URL:https://github.com/iSee857/CVE-2024-9047-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本
URL:https://github.com/iSee857/CVE-2024-9047-PoC
标签:#CVE-2024
GitHub
GitHub - iSee857/CVE-2024-9047-PoC: WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本
WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本 - iSee857/CVE-2024-9047-PoC
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-30085 (Alex Birnberg)
URL:https://github.com/Adamkadaban/CVE-2024-30085
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-30085 (Alex Birnberg)
URL:https://github.com/Adamkadaban/CVE-2024-30085
标签:#CVE-2024
GitHub
GitHub - Adamkadaban/CVE-2024-30085: CVE-2024-30085
CVE-2024-30085. Contribute to Adamkadaban/CVE-2024-30085 development by creating an account on GitHub.