GitHub监控消息提醒!!!
更新了:渗透测试
描述:PenSafe(渗透测试安全扫描器),能用上此工具说明测试系统很安全!!!
URL:https://github.com/yuning029/PenSafe
标签:#渗透测试
更新了:渗透测试
描述:PenSafe(渗透测试安全扫描器),能用上此工具说明测试系统很安全!!!
URL:https://github.com/yuning029/PenSafe
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:反序列化
描述:ysoSimple:简易的Java漏洞利用工具,集成Java反序列化,Hessian反序列化,XStream反序列化,SnakeYaml反序列化,Shiro550,JSF反序列化,SSTI模板注入,JdbcAttackPayload,JNDIAttack,字节码生成。
URL:https://github.com/B0T1eR/ysoSimple
标签:#反序列化
更新了:反序列化
描述:ysoSimple:简易的Java漏洞利用工具,集成Java反序列化,Hessian反序列化,XStream反序列化,SnakeYaml反序列化,Shiro550,JSF反序列化,SSTI模板注入,JdbcAttackPayload,JNDIAttack,字节码生成。
URL:https://github.com/B0T1eR/ysoSimple
标签:#反序列化
GitHub
GitHub - B0T1eR/ysoSimple: ysoSimple:简易的Java漏洞利用工具,集成Java反序列化,Hessian反序列化,XStream反序列化,SnakeYaml反序列化,Shiro550,JSF反序列化,SSTI模板注入,…
ysoSimple:简易的Java漏洞利用工具,集成Java反序列化,Hessian反序列化,XStream反序列化,SnakeYaml反序列化,Shiro550,JSF反序列化,SSTI模板注入,JdbcAttackPayload,JNDIAttack,字节码生成。 - B0T1eR/ysoSimple
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.
URL:https://github.com/FarizDevloper/CVE-2017-2024
标签:#CVE-2024
更新了:CVE-2024
描述:CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.
URL:https://github.com/FarizDevloper/CVE-2017-2024
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A vulnerability scanner for Firefox and Thunderbird that checks if your versions are out of date and susceptible to CVE-2024-9680.
URL:https://github.com/PraiseImafidon/Version_Vulnerability_Scanner
标签:#CVE-2024
更新了:CVE-2024
描述:A vulnerability scanner for Firefox and Thunderbird that checks if your versions are out of date and susceptible to CVE-2024-9680.
URL:https://github.com/PraiseImafidon/Version_Vulnerability_Scanner
标签:#CVE-2024
GitHub
GitHub - PraiseImafidon/Version_Vulnerability_Scanner: A vulnerability scanner for Firefox and Thunderbird that checks if your…
A vulnerability scanner for Firefox and Thunderbird that checks if your versions are out of date and susceptible to CVE-2024-9680. - PraiseImafidon/Version_Vulnerability_Scanner
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Tentang Pemindai & Eksploitasi Apache OFBiz RCE (CVE-2024-38856)
URL:https://github.com/FakesiteSecurity/CVE-2024-38856_Scen
标签:#CVE-2024
更新了:CVE-2024
描述:Tentang Pemindai & Eksploitasi Apache OFBiz RCE (CVE-2024-38856)
URL:https://github.com/FakesiteSecurity/CVE-2024-38856_Scen
标签:#CVE-2024
GitHub
GitHub - FakesiteSecurity/CVE-2024-38856_Scen: Tentang Pemindai & Eksploitasi Apache OFBiz RCE (CVE-2024-38856)
Tentang Pemindai & Eksploitasi Apache OFBiz RCE (CVE-2024-38856) - FakesiteSecurity/CVE-2024-38856_Scen
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113
URL:https://github.com/SafeBreach-Labs/CVE-2024-49113
标签:#CVE-2024
更新了:CVE-2024
描述:LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113
URL:https://github.com/SafeBreach-Labs/CVE-2024-49113
标签:#CVE-2024
GitHub
GitHub - SafeBreach-Labs/CVE-2024-49113: LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113
LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113 - SafeBreach-Labs/CVE-2024-49113
GitHub监控消息提醒!!!
更新了:代码审计
描述:自动化+ai+codeql实现代码审计工具
URL:https://github.com/Dr0se-mirror/CodeQl_sectool
标签:#代码审计
更新了:代码审计
描述:自动化+ai+codeql实现代码审计工具
URL:https://github.com/Dr0se-mirror/CodeQl_sectool
标签:#代码审计
GitHub
GitHub - Dr0se-mirror/CodeQl_sectool
Contribute to Dr0se-mirror/CodeQl_sectool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Zabbix CVE-2024-42327 PoC
URL:https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE
标签:#RCE
更新了:RCE
描述:Zabbix CVE-2024-42327 PoC
URL:https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE
标签:#RCE
GitHub
GitHub - BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE: Zabbix CVE-2024-42327 PoC
Zabbix CVE-2024-42327 PoC. Contribute to BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:信息系统渗透测试方案下载分享
URL:https://github.com/chaos198800/xin-xi-xi-tong-shen-tou-ce-shi-fang-an-xia-zai-fen-xiang
标签:#渗透测试
更新了:渗透测试
描述:信息系统渗透测试方案下载分享
URL:https://github.com/chaos198800/xin-xi-xi-tong-shen-tou-ce-shi-fang-an-xia-zai-fen-xiang
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for CVE-2024-53677
URL:https://github.com/EQSTLab/CVE-2024-53677
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for CVE-2024-53677
URL:https://github.com/EQSTLab/CVE-2024-53677
标签:#CVE-2024
GitHub
GitHub - EQSTLab/CVE-2024-53677: File upload logic flaw in Apache Struts2 exploit
File upload logic flaw in Apache Struts2 exploit. Contribute to EQSTLab/CVE-2024-53677 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:使用DoH + ECH实现的简单的Https和Websocket请求demo,可绕过GFW,用于研究流量隐藏技术
URL:https://github.com/0xCaner/DoH-ECH-Demo
标签:#绕过
更新了:绕过
描述:使用DoH + ECH实现的简单的Https和Websocket请求demo,可绕过GFW,用于研究流量隐藏技术
URL:https://github.com/0xCaner/DoH-ECH-Demo
标签:#绕过
GitHub
GitHub - 0xCaner/DoH-ECH-Demo: 使用DoH + ECH实现的简单的Https和Websocket请求demo,可绕过GFW,用于研究流量隐藏技术
使用DoH + ECH实现的简单的Https和Websocket请求demo,可绕过GFW,用于研究流量隐藏技术 - 0xCaner/DoH-ECH-Demo
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A Python noscript to scan websites for the CVE-2024-51378 vulnerability.
URL:https://github.com/i0x29A/CVE-2024-51378
标签:#CVE-2024
更新了:CVE-2024
描述:A Python noscript to scan websites for the CVE-2024-51378 vulnerability.
URL:https://github.com/i0x29A/CVE-2024-51378
标签:#CVE-2024
GitHub
GitHub - i0x29A/CVE-2024-51378: A Python noscript to scan websites for the CVE-2024-51378 vulnerability.
A Python noscript to scan websites for the CVE-2024-51378 vulnerability. - i0x29A/CVE-2024-51378
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Some collection aggressor noscripts for Cobalt Strike Aggressor Scripts
URL:https://github.com/Sh3lldon/Cobalt-Strike-Aggressor-Scripts
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Some collection aggressor noscripts for Cobalt Strike Aggressor Scripts
URL:https://github.com/Sh3lldon/Cobalt-Strike-Aggressor-Scripts
标签:#Cobalt Strike
GitHub
GitHub - Sh3lldon/Cobalt-Strike-Aggressor-Scripts: Some collection aggressor noscripts for Cobalt Strike Aggressor Scripts
Some collection aggressor noscripts for Cobalt Strike Aggressor Scripts - Sh3lldon/Cobalt-Strike-Aggressor-Scripts
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP unserialization vulnerability leading to potential remote code execution (RCE) if tainted data is processed.
URL:https://github.com/Bug-Hunter-X/PHP-Unserialization-Vulnerability--Potential-RCE-3mt9c
标签:#RCE
更新了:RCE
描述:PHP unserialization vulnerability leading to potential remote code execution (RCE) if tainted data is processed.
URL:https://github.com/Bug-Hunter-X/PHP-Unserialization-Vulnerability--Potential-RCE-3mt9c
标签:#RCE
GitHub
GitHub - Bug-Hunter-X/PHP-Unserialization-Vulnerability--Potential-RCE-3mt9c: PHP unserialization vulnerability leading to potential…
PHP unserialization vulnerability leading to potential remote code execution (RCE) if tainted data is processed. - Bug-Hunter-X/PHP-Unserialization-Vulnerability--Potential-RCE-3mt9c
👎9
GitHub监控消息提醒!!!
更新了:信息收集
描述:万恶的兼职公司剥削我,每天干8小时才赚100。生活所迫,只能写一基于Python的GUI插件用于提升信息收集的速度
URL:https://github.com/SimonSkywalke/InformationCollectionPart-time
标签:#信息收集
更新了:信息收集
描述:万恶的兼职公司剥削我,每天干8小时才赚100。生活所迫,只能写一基于Python的GUI插件用于提升信息收集的速度
URL:https://github.com/SimonSkywalke/InformationCollectionPart-time
标签:#信息收集
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike Shellcode Bypass Loader
URL:https://github.com/chenshiyi007/OrangeLoader
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike Shellcode Bypass Loader
URL:https://github.com/chenshiyi007/OrangeLoader
标签:#Cobalt Strike
GitHub
GitHub - chenshiyi007/OrangeLoader: Cobalt Strike Shellcode Bypass Loader
Cobalt Strike Shellcode Bypass Loader. Contribute to chenshiyi007/OrangeLoader development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用
URL:https://github.com/perlh/hscan
标签:#漏洞利用
更新了:漏洞利用
描述:hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用
URL:https://github.com/perlh/hscan
标签:#漏洞利用
GitHub
GitHub - perlh/hscan: hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用
hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用 - perlh/hscan
GitHub监控消息提醒!!!
更新了:信息收集
描述:ECNU CS & SE 信息收集; 华师大计软院友墙
URL:https://github.com/ECNUCSE/ECNU_ITers
标签:#信息收集
更新了:信息收集
描述:ECNU CS & SE 信息收集; 华师大计软院友墙
URL:https://github.com/ECNUCSE/ECNU_ITers
标签:#信息收集
GitHub
GitHub - ECNUCSE/ECNU_ITers: ECNU CS & SE 信息收集; 华师大计软院友墙
ECNU CS & SE 信息收集; 华师大计软院友墙. Contribute to ECNUCSE/ECNU_ITers development by creating an account on GitHub.