GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Struts Vulnerability - CVE-2024-53677
URL:https://github.com/Q0LT/VM-CVE-2024-53677
标签:#CVE-2024
更新了:CVE-2024
描述:Struts Vulnerability - CVE-2024-53677
URL:https://github.com/Q0LT/VM-CVE-2024-53677
标签:#CVE-2024
GitHub
GitHub - Q0LT/VM-CVE-2024-53677: Struts Vulnerability - CVE-2024-53677
Struts Vulnerability - CVE-2024-53677. Contribute to Q0LT/VM-CVE-2024-53677 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE
URL:https://github.com/Harshit-Mashru/iTop-CVEs-exploit
标签:#RCE
更新了:RCE
描述:This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE
URL:https://github.com/Harshit-Mashru/iTop-CVEs-exploit
标签:#RCE
GitHub
GitHub - Harshit-Mashru/iTop-CVEs-exploit: This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that…
This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE - Harshit-Mashru/iTop-CVEs-exploit
GitHub监控消息提醒!!!
更新了:免杀
描述:可免杀火绒,360,Defender ,GW小绿球
URL:https://github.com/xiaogaojiayou/fscan---
标签:#免杀
更新了:免杀
描述:可免杀火绒,360,Defender ,GW小绿球
URL:https://github.com/xiaogaojiayou/fscan---
标签:#免杀
GitHub
GitHub - xiaogaojiayou/fscan---: 可免杀火绒,360,Defender ,GW小绿球
可免杀火绒,360,Defender ,GW小绿球. Contribute to xiaogaojiayou/fscan--- development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-32113 PoC
URL:https://github.com/MikeyPPPPPPPP/CVE-2024-32113
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-32113 PoC
URL:https://github.com/MikeyPPPPPPPP/CVE-2024-32113
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team / Pentesting practice
URL:https://github.com/Mihindig/MITRE-ATT-CK-Persistence-Detection-with-Splunk-
标签:#Red Team
更新了:Red Team
描述:Red Team / Pentesting practice
URL:https://github.com/Mihindig/MITRE-ATT-CK-Persistence-Detection-with-Splunk-
标签:#Red Team
GitHub
GitHub - Mihindig/Detecting-Evil-with-Splunk-and-MITRE-ATT-CK: A practical cybersecurity project demonstrating MITRE ATT&CK mapping…
A practical cybersecurity project demonstrating MITRE ATT&CK mapping, Splunk queries, and Atomic Red Team tests. Simulates real-world attack techniques like BITS Job (T1197) and PowerShell ...
GitHub监控消息提醒!!!
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/H-9527/SOPlanning_exploit
标签:#RCE
更新了:RCE
描述:Automatic thesauri backups from RCE PoolParty
URL:https://github.com/H-9527/SOPlanning_exploit
标签:#RCE
GitHub
GitHub - H-9527/SOPlanning_exploit: To see if I can recreate the exploit scenario found on Exploit-DB. [SOPlanning 1.52.01 (Simple…
To see if I can recreate the exploit scenario found on Exploit-DB. [SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) ](https://www.exploit-db.com/explo...
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/dragonXZH/CVE-2024-10914
标签:#CVE-2024
更新了:CVE-2024
描述:A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
URL:https://github.com/dragonXZH/CVE-2024-10914
标签:#CVE-2024
GitHub
GitHub - dragonXZH/CVE-2024-10914: A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE)
A PoC exploit for CVE-2024-10914 - D-Link Remote Code Execution (RCE) - dragonXZH/CVE-2024-10914
GitHub监控消息提醒!!!
更新了:webshell
描述:A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.
URL:https://github.com/LT-lanthau/Webshell
标签:#webshell
更新了:webshell
描述:A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.
URL:https://github.com/LT-lanthau/Webshell
标签:#webshell
GitHub
GitHub - LT-lanthau/Webshell: A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.
A collection of webshells for learning only. All forms of misuse and violations are not our responsibility. - LT-lanthau/Webshell
GitHub监控消息提醒!!!
更新了:反序列化
描述:Shiro反序列化工具-加强版
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-gong-ju---jia-qiang-ban
标签:#反序列化
更新了:反序列化
描述:Shiro反序列化工具-加强版
URL:https://github.com/chaos198800/Shiro-fan-xu-lie-hua-gong-ju---jia-qiang-ban
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module
URL:https://github.com/BOl1o/CVE-2024-49112-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module
URL:https://github.com/BOl1o/CVE-2024-49112-PoC
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-50379-exp
URL:https://github.com/lizhianyuguangming/CVE-2024-50379-exp
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-50379-exp
URL:https://github.com/lizhianyuguangming/CVE-2024-50379-exp
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本
URL:https://github.com/iSee857/CVE-2024-9047-PoC
标签:#CVE-2024
更新了:CVE-2024
描述:WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本
URL:https://github.com/iSee857/CVE-2024-9047-PoC
标签:#CVE-2024
GitHub
GitHub - iSee857/CVE-2024-9047-PoC: WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本
WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本 - iSee857/CVE-2024-9047-PoC
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-30085 (Alex Birnberg)
URL:https://github.com/Adamkadaban/CVE-2024-30085
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-30085 (Alex Birnberg)
URL:https://github.com/Adamkadaban/CVE-2024-30085
标签:#CVE-2024
GitHub
GitHub - Adamkadaban/CVE-2024-30085: CVE-2024-30085
CVE-2024-30085. Contribute to Adamkadaban/CVE-2024-30085 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:代码审计
描述:这是一款图形化的代码审计工具,支持对规则进行增删改查。可协助代码审计人员在日常代审中对于规则的积累。其中配置页面可配置:审计文件后缀、审计路径关键字、禁止审计路径关键字。支持 java php net项目审计。
URL:https://github.com/vsdwef/StarCodeSecurity
标签:#代码审计
更新了:代码审计
描述:这是一款图形化的代码审计工具,支持对规则进行增删改查。可协助代码审计人员在日常代审中对于规则的积累。其中配置页面可配置:审计文件后缀、审计路径关键字、禁止审计路径关键字。支持 java php net项目审计。
URL:https://github.com/vsdwef/StarCodeSecurity
标签:#代码审计
GitHub
GitHub - vsdwef/StarCodeSecurity: 这是一款图形化的代码审计工具,支持对规则进行增删改查。可协助代码审计人员在日常代审中对于规则的积累。其中配置页面可配置:审计文件后缀、审计路径关键字、禁止审计路径关键字。支持 java…
这是一款图形化的代码审计工具,支持对规则进行增删改查。可协助代码审计人员在日常代审中对于规则的积累。其中配置页面可配置:审计文件后缀、审计路径关键字、禁止审计路径关键字。支持 java php net项目审计。 - vsdwef/StarCodeSecurity
GitHub监控消息提醒!!!
更新了:反序列化
描述:基于Qt的QDataStream,做了一层封装,实现Qt数据和自定义结构体类的序列号和反序列化,简化使用流程
URL:https://github.com/j05070415/QSerializer
标签:#反序列化
更新了:反序列化
描述:基于Qt的QDataStream,做了一层封装,实现Qt数据和自定义结构体类的序列号和反序列化,简化使用流程
URL:https://github.com/j05070415/QSerializer
标签:#反序列化
GitHub
GitHub - j05070415/QSerializer: 基于Qt的QDataStream,做了一层封装,实现Qt数据和自定义结构体类的序列号和反序列化,简化使用流程
基于Qt的QDataStream,做了一层封装,实现Qt数据和自定义结构体类的序列号和反序列化,简化使用流程 - j05070415/QSerializer
GitHub监控消息提醒!!!
更新了:RCE
描述:🐍 SQL Injection (SQLi) 🚨 Cross-Site Scripting (XSS) 🔐 Remote Code Execution (RCE) 🔍 And more!
URL:https://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212
标签:#RCE
更新了:RCE
描述:🐍 SQL Injection (SQLi) 🚨 Cross-Site Scripting (XSS) 🔐 Remote Code Execution (RCE) 🔍 And more!
URL:https://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212
标签:#RCE
GitHub
GitHub - Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212: Demonstrating the exploitation of the Remote Code Execution…
Demonstrating the exploitation of the Remote Code Execution (RCE) vulnerability in Kemp LoadMaster (CVE-2024-1212). This project covers reconnaissance, vulnerability scanning using Nuclei, and expl...
GitHub监控消息提醒!!!
更新了:红蓝对抗
描述:红蓝对抗重点OA系统漏洞利用工具新年贺岁版V2.0
URL:https://github.com/chaos198800/hong-lan-dui-kang-zhong-dian-OA-xi-tong-lou-dong-li-yong-gong-ju-xin-nian-he-sui-ban-V2.0
标签:#红蓝对抗
更新了:红蓝对抗
描述:红蓝对抗重点OA系统漏洞利用工具新年贺岁版V2.0
URL:https://github.com/chaos198800/hong-lan-dui-kang-zhong-dian-OA-xi-tong-lou-dong-li-yong-gong-ju-xin-nian-he-sui-ban-V2.0
标签:#红蓝对抗
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Testing the latset Apache Tomcat CVE-2024-50379 Vuln
URL:https://github.com/bigb0x/CVE-2024-50379
标签:#CVE-2024
更新了:CVE-2024
描述:Testing the latset Apache Tomcat CVE-2024-50379 Vuln
URL:https://github.com/bigb0x/CVE-2024-50379
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Drupal CVE-2024-45440
URL:https://github.com/w0r1i0g1ht/CVE-2024-45440
标签:#CVE-2024
更新了:CVE-2024
描述:Drupal CVE-2024-45440
URL:https://github.com/w0r1i0g1ht/CVE-2024-45440
标签:#CVE-2024
GitHub
GitHub - w0r1i0g1ht/CVE-2024-45440: Drupal CVE-2024-45440
Drupal CVE-2024-45440. Contribute to w0r1i0g1ht/CVE-2024-45440 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.
URL:https://github.com/0dayan0n/RCE_CVE-2024-7954-
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.
URL:https://github.com/0dayan0n/RCE_CVE-2024-7954-
标签:#CVE-2024
GitHub
GitHub - 0dayan0n/RCE_CVE-2024-7954-: The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable…
The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PH...