GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-11349: Authentication Bypass Using an Alternate Path or Channel (CWE-288)
URL:https://github.com/linunyang/CVE-2024-11349
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-11349: Authentication Bypass Using an Alternate Path or Channel (CWE-288)
URL:https://github.com/linunyang/CVE-2024-11349
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-50379利用
URL:https://github.com/dear-cell/CVE-2024-50379
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-50379利用
URL:https://github.com/dear-cell/CVE-2024-50379
标签:#CVE-2024
GitHub
GitHub - dear-cell/CVE-2024-50379: CVE-2024-50379利用
CVE-2024-50379利用. Contribute to dear-cell/CVE-2024-50379 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit
URL:https://github.com/xpltive/CVE-2023-41425
标签:#RCE
更新了:RCE
描述:WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit
URL:https://github.com/xpltive/CVE-2023-41425
标签:#RCE
GitHub
GitHub - xpltive/CVE-2023-41425: WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit
WonderCMS v3.2.0 - v3.4.2 XSS to RCE exploit. Contribute to xpltive/CVE-2023-41425 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/ShinoMashiru/HIT-2022
标签:#代码注入
更新了:代码注入
描述:JCore致力于提供C语言最实用的数据结构、工具、算法。目前已提供一个内存调试工具,采用代码注入的方法,无需重新编译原始程序,即可调试它的内存问题。
URL:https://github.com/ShinoMashiru/HIT-2022
标签:#代码注入
GitHub
GitHub - ShinoMashiru/HIT-2022: HIT2022大数据分析实验,很烂,且参考了很多学长代码,勿喷,有能力自学自己写还是最好的。不过代码注释和报告写得还算详细吧,读起来应该比较方便,实在不会写代码当个入门教程看看也可以,感觉…
HIT2022大数据分析实验,很烂,且参考了很多学长代码,勿喷,有能力自学自己写还是最好的。不过代码注释和报告写得还算详细吧,读起来应该比较方便,实在不会写代码当个入门教程看看也可以,感觉网上mapreduce相关教程挺烂的,不知道别人都是怎么学的,不过和我一样没什么同专业朋友的话自学应该还是比较痛苦,有同学一起写可能好点。总之如果你觉得这些能帮到你的话就好,自认为注释和报告还算详细了。在忙...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Struts Vulnerability - CVE-2024-53677
URL:https://github.com/Q0LT/VM-CVE-2024-53677
标签:#CVE-2024
更新了:CVE-2024
描述:Struts Vulnerability - CVE-2024-53677
URL:https://github.com/Q0LT/VM-CVE-2024-53677
标签:#CVE-2024
GitHub
GitHub - Q0LT/VM-CVE-2024-53677: Struts Vulnerability - CVE-2024-53677
Struts Vulnerability - CVE-2024-53677. Contribute to Q0LT/VM-CVE-2024-53677 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE
URL:https://github.com/Harshit-Mashru/iTop-CVEs-exploit
标签:#RCE
更新了:RCE
描述:This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE
URL:https://github.com/Harshit-Mashru/iTop-CVEs-exploit
标签:#RCE
GitHub
GitHub - Harshit-Mashru/iTop-CVEs-exploit: This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that…
This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE - Harshit-Mashru/iTop-CVEs-exploit
GitHub监控消息提醒!!!
更新了:免杀
描述:可免杀火绒,360,Defender ,GW小绿球
URL:https://github.com/xiaogaojiayou/fscan---
标签:#免杀
更新了:免杀
描述:可免杀火绒,360,Defender ,GW小绿球
URL:https://github.com/xiaogaojiayou/fscan---
标签:#免杀
GitHub
GitHub - xiaogaojiayou/fscan---: 可免杀火绒,360,Defender ,GW小绿球
可免杀火绒,360,Defender ,GW小绿球. Contribute to xiaogaojiayou/fscan--- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-32113 PoC
URL:https://github.com/MikeyPPPPPPPP/CVE-2024-32113
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-32113 PoC
URL:https://github.com/MikeyPPPPPPPP/CVE-2024-32113
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team / Pentesting practice
URL:https://github.com/Mihindig/MITRE-ATT-CK-Persistence-Detection-with-Splunk-
标签:#Red Team
更新了:Red Team
描述:Red Team / Pentesting practice
URL:https://github.com/Mihindig/MITRE-ATT-CK-Persistence-Detection-with-Splunk-
标签:#Red Team
GitHub
GitHub - Mihindig/Detecting-Evil-with-Splunk-and-MITRE-ATT-CK: A practical cybersecurity project demonstrating MITRE ATT&CK mapping…
A practical cybersecurity project demonstrating MITRE ATT&CK mapping, Splunk queries, and Atomic Red Team tests. Simulates real-world attack techniques like BITS Job (T1197) and PowerShell ...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/H-9527/SOPlanning_exploit
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/H-9527/SOPlanning_exploit
标签:#RCE
GitHub
GitHub - H-9527/SOPlanning_exploit: To see if I can recreate the exploit scenario found on Exploit-DB. [SOPlanning 1.52.01 (Simple…
To see if I can recreate the exploit scenario found on Exploit-DB. [SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) ](https://www.exploit-db.com/explo...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/dragonXZH/CVE-2024-10914
标签:#CVE-2024
更新了:CVE-2024
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/dragonXZH/CVE-2024-10914
标签:#CVE-2024
GitHub
GitHub - dragonXZH/CVE-2024-10914: A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) - dragonXZH/CVE-2024-10914
GitHub监控消息提醒!!!
更新了:webshell
描述:A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.
URL:https://github.com/LT-lanthau/Webshell
标签:#webshell
更新了:webshell
描述:A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.
URL:https://github.com/LT-lanthau/Webshell
标签:#webshell
GitHub
GitHub - LT-lanthau/Webshell: A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.
A collection of webshells for learning only. All forms of misuse and violations are not our responsibility. - LT-lanthau/Webshell
GitHub监控消息提醒!!!
更新了:反序列化
描述:Shiro反序列化工具-加强版
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-gong-ju---jia-qiang-ban
标签:#反序列化
更新了:反序列化
描述:Shiro反序列化工具-加强版
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-gong-ju---jia-qiang-ban
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module
URL:https://github.com/BOl1o/CVE-2024-49112-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module
URL:https://github.com/BOl1o/CVE-2024-49112-PoC
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-50379-exp
URL:https://github.com/lizhianyuguangming/CVE-2024-50379-exp
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-50379-exp
URL:https://github.com/lizhianyuguangming/CVE-2024-50379-exp
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本
URL:https://github.com/iSee857/CVE-2024-9047-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本
URL:https://github.com/iSee857/CVE-2024-9047-PoC
标签:#CVE-2024
GitHub
GitHub - iSee857/CVE-2024-9047-PoC: WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本
WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本 - iSee857/CVE-2024-9047-PoC
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-30085 (Alex Birnberg)
URL:https://github.com/Adamkadaban/CVE-2024-30085
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-30085 (Alex Birnberg)
URL:https://github.com/Adamkadaban/CVE-2024-30085
标签:#CVE-2024
GitHub
GitHub - Adamkadaban/CVE-2024-30085: CVE-2024-30085
CVE-2024-30085. Contribute to Adamkadaban/CVE-2024-30085 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:这是一款图形化的代码审计工具,支持对规则进行增删改查。可协助代码审计人员在日常代审中对于规则的积累。其中配置页面可配置:审计文件后缀、审计路径关键字、禁止审计路径关键字。支持 java php net项目审计。
URL:https://github.com/vsdwef/StarCodeSecurity
标签:#代码审计
更新了:代码审计
描述:这是一款图形化的代码审计工具,支持对规则进行增删改查。可协助代码审计人员在日常代审中对于规则的积累。其中配置页面可配置:审计文件后缀、审计路径关键字、禁止审计路径关键字。支持 java php net项目审计。
URL:https://github.com/vsdwef/StarCodeSecurity
标签:#代码审计
GitHub
GitHub - vsdwef/StarCodeSecurity: 这是一款图形化的代码审计工具,支持对规则进行增删改查。可协助代码审计人员在日常代审中对于规则的积累。其中配置页面可配置:审计文件后缀、审计路径关键字、禁止审计路径关键字。支持 java…
这是一款图形化的代码审计工具,支持对规则进行增删改查。可协助代码审计人员在日常代审中对于规则的积累。其中配置页面可配置:审计文件后缀、审计路径关键字、禁止审计路径关键字。支持 java php net项目审计。 - vsdwef/StarCodeSecurity
GitHub监控消息提醒!!!
更新了:反序列化
描述:基于Qt的QDataStream,做了一层封装,实现Qt数据和自定义结构体类的序列号和反序列化,简化使用流程
URL:https://github.com/j05070415/QSerializer
标签:#反序列化
更新了:反序列化
描述:基于Qt的QDataStream,做了一层封装,实现Qt数据和自定义结构体类的序列号和反序列化,简化使用流程
URL:https://github.com/j05070415/QSerializer
标签:#反序列化
GitHub
GitHub - j05070415/QSerializer: 基于Qt的QDataStream,做了一层封装,实现Qt数据和自定义结构体类的序列号和反序列化,简化使用流程
基于Qt的QDataStream,做了一层封装,实现Qt数据和自定义结构体类的序列号和反序列化,简化使用流程 - j05070415/QSerializer
GitHub监控消息提醒!!!
更新了:RCE
描述:🐍 SQL Injection (SQLi) 🚨 Cross-Site Scripting (XSS) 🔐 Remote Code Execution (RCE) 🔍 And more!
URL:https://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212
标签:#RCE
更新了:RCE
描述:🐍 SQL Injection (SQLi) 🚨 Cross-Site Scripting (XSS) 🔐 Remote Code Execution (RCE) 🔍 And more!
URL:https://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212
标签:#RCE
GitHub
GitHub - Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212: Demonstrating the exploitation of the Remote Code Execution…
Demonstrating the exploitation of the Remote Code Execution (RCE) vulnerability in Kemp LoadMaster (CVE-2024-1212). This project covers reconnaissance, vulnerability scanning using Nuclei, and expl...