GitHub监控消息提醒!!!
更新了:代码审计
描述:自动化+ai+codeql实现代码审计工具
URL:https://github.com/Dr0se-mirror/CodeQl_sectool
标签:#代码审计
更新了:代码审计
描述:自动化+ai+codeql实现代码审计工具
URL:https://github.com/Dr0se-mirror/CodeQl_sectool
标签:#代码审计
GitHub
GitHub - Dr0se-mirror/CodeQl_sectool
Contribute to Dr0se-mirror/CodeQl_sectool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:Zabbix CVE-2024-42327 PoC
URL:https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE
标签:#RCE
更新了:RCE
描述:Zabbix CVE-2024-42327 PoC
URL:https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE
标签:#RCE
GitHub
GitHub - BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE: Zabbix CVE-2024-42327 PoC
Zabbix CVE-2024-42327 PoC. Contribute to BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:信息系统渗透测试方案下载分享
URL:https://github.com/chaos198800/xin-xi-xi-tong-shen-tou-ce-shi-fang-an-xia-zai-fen-xiang
标签:#渗透测试
更新了:渗透测试
描述:信息系统渗透测试方案下载分享
URL:https://github.com/chaos198800/xin-xi-xi-tong-shen-tou-ce-shi-fang-an-xia-zai-fen-xiang
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for CVE-2024-53677
URL:https://github.com/EQSTLab/CVE-2024-53677
标签:#CVE-2024
更新了:CVE-2024
描述:PoC for CVE-2024-53677
URL:https://github.com/EQSTLab/CVE-2024-53677
标签:#CVE-2024
GitHub
GitHub - EQSTLab/CVE-2024-53677: File upload logic flaw in Apache Struts2 exploit
File upload logic flaw in Apache Struts2 exploit. Contribute to EQSTLab/CVE-2024-53677 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:使用DoH + ECH实现的简单的Https和Websocket请求demo,可绕过GFW,用于研究流量隐藏技术
URL:https://github.com/0xCaner/DoH-ECH-Demo
标签:#绕过
更新了:绕过
描述:使用DoH + ECH实现的简单的Https和Websocket请求demo,可绕过GFW,用于研究流量隐藏技术
URL:https://github.com/0xCaner/DoH-ECH-Demo
标签:#绕过
GitHub
GitHub - 0xCaner/DoH-ECH-Demo: 使用DoH + ECH实现的简单的Https和Websocket请求demo,可绕过GFW,用于研究流量隐藏技术
使用DoH + ECH实现的简单的Https和Websocket请求demo,可绕过GFW,用于研究流量隐藏技术 - 0xCaner/DoH-ECH-Demo
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:A Python noscript to scan websites for the CVE-2024-51378 vulnerability.
URL:https://github.com/i0x29A/CVE-2024-51378
标签:#CVE-2024
更新了:CVE-2024
描述:A Python noscript to scan websites for the CVE-2024-51378 vulnerability.
URL:https://github.com/i0x29A/CVE-2024-51378
标签:#CVE-2024
GitHub
GitHub - i0x29A/CVE-2024-51378: A Python noscript to scan websites for the CVE-2024-51378 vulnerability.
A Python noscript to scan websites for the CVE-2024-51378 vulnerability. - i0x29A/CVE-2024-51378
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Some collection aggressor noscripts for Cobalt Strike Aggressor Scripts
URL:https://github.com/Sh3lldon/Cobalt-Strike-Aggressor-Scripts
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Some collection aggressor noscripts for Cobalt Strike Aggressor Scripts
URL:https://github.com/Sh3lldon/Cobalt-Strike-Aggressor-Scripts
标签:#Cobalt Strike
GitHub
GitHub - Sh3lldon/Cobalt-Strike-Aggressor-Scripts: Some collection aggressor noscripts for Cobalt Strike Aggressor Scripts
Some collection aggressor noscripts for Cobalt Strike Aggressor Scripts - Sh3lldon/Cobalt-Strike-Aggressor-Scripts
👍1
GitHub监控消息提醒!!!
更新了:RCE
描述:PHP unserialization vulnerability leading to potential remote code execution (RCE) if tainted data is processed.
URL:https://github.com/Bug-Hunter-X/PHP-Unserialization-Vulnerability--Potential-RCE-3mt9c
标签:#RCE
更新了:RCE
描述:PHP unserialization vulnerability leading to potential remote code execution (RCE) if tainted data is processed.
URL:https://github.com/Bug-Hunter-X/PHP-Unserialization-Vulnerability--Potential-RCE-3mt9c
标签:#RCE
GitHub
GitHub - Bug-Hunter-X/PHP-Unserialization-Vulnerability--Potential-RCE-3mt9c: PHP unserialization vulnerability leading to potential…
PHP unserialization vulnerability leading to potential remote code execution (RCE) if tainted data is processed. - Bug-Hunter-X/PHP-Unserialization-Vulnerability--Potential-RCE-3mt9c
👎9
GitHub监控消息提醒!!!
更新了:信息收集
描述:万恶的兼职公司剥削我,每天干8小时才赚100。生活所迫,只能写一基于Python的GUI插件用于提升信息收集的速度
URL:https://github.com/SimonSkywalke/InformationCollectionPart-time
标签:#信息收集
更新了:信息收集
描述:万恶的兼职公司剥削我,每天干8小时才赚100。生活所迫,只能写一基于Python的GUI插件用于提升信息收集的速度
URL:https://github.com/SimonSkywalke/InformationCollectionPart-time
标签:#信息收集
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike Shellcode Bypass Loader
URL:https://github.com/chenshiyi007/OrangeLoader
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:Cobalt Strike Shellcode Bypass Loader
URL:https://github.com/chenshiyi007/OrangeLoader
标签:#Cobalt Strike
GitHub
GitHub - chenshiyi007/OrangeLoader: Cobalt Strike Shellcode Bypass Loader
Cobalt Strike Shellcode Bypass Loader. Contribute to chenshiyi007/OrangeLoader development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:漏洞利用
描述:hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用
URL:https://github.com/perlh/hscan
标签:#漏洞利用
更新了:漏洞利用
描述:hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用
URL:https://github.com/perlh/hscan
标签:#漏洞利用
GitHub
GitHub - perlh/hscan: hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用
hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用 - perlh/hscan
GitHub监控消息提醒!!!
更新了:信息收集
描述:ECNU CS & SE 信息收集; 华师大计软院友墙
URL:https://github.com/ECNUCSE/ECNU_ITers
标签:#信息收集
更新了:信息收集
描述:ECNU CS & SE 信息收集; 华师大计软院友墙
URL:https://github.com/ECNUCSE/ECNU_ITers
标签:#信息收集
GitHub
GitHub - ECNUCSE/ECNU_ITers: ECNU CS & SE 信息收集; 华师大计软院友墙
ECNU CS & SE 信息收集; 华师大计软院友墙. Contribute to ECNUCSE/ECNU_ITers development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:python3 port of https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE/blob/main/LinScada_RCE.py
URL:https://github.com/voidvxvt/CVE-2021-26828
标签:#RCE
更新了:RCE
描述:python3 port of https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE/blob/main/LinScada_RCE.py
URL:https://github.com/voidvxvt/CVE-2021-26828
标签:#RCE
GitHub
CVE-2021-26828_ScadaBR_RCE/LinScada_RCE.py at main · hev0x/CVE-2021-26828_ScadaBR_RCE
Contribute to hev0x/CVE-2021-26828_ScadaBR_RCE development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:EVSE Red Team CLI
URL:https://github.com/witchofthewires/evsetool
标签:#Red Team
更新了:Red Team
描述:EVSE Red Team CLI
URL:https://github.com/witchofthewires/evsetool
标签:#Red Team
GitHub
GitHub - witchofthewires/evsetool: OCPP1.6 parsing utility
OCPP1.6 parsing utility. Contribute to witchofthewires/evsetool development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:RCE
描述:A magical repository that can upgrade your Git from 2.45.0 to 2.45.1 automatically with the Git RCE glitch.
URL:https://github.com/happymimimix/Git-Auto-Updater
标签:#RCE
更新了:RCE
描述:A magical repository that can upgrade your Git from 2.45.0 to 2.45.1 automatically with the Git RCE glitch.
URL:https://github.com/happymimimix/Git-Auto-Updater
标签:#RCE
GitHub
GitHub - happymimimix/Git-Auto-Updater: A magical repository that can upgrade your Git from 2.45.0 to 2.45.1 automatically with…
A magical repository that can upgrade your Git from 2.45.0 to 2.45.1 automatically with the Git RCE glitch. - GitHub - happymimimix/Git-Auto-Updater: A magical repository that can upgrade your Git...
GitHub监控消息提醒!!!
更新了:RCE
描述:Exploit For SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
URL:https://github.com/theexploiters/SOPlanning-1.52.01-RCE-Exploit
标签:#RCE
更新了:RCE
描述:Exploit For SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
URL:https://github.com/theexploiters/SOPlanning-1.52.01-RCE-Exploit
标签:#RCE
GitHub
GitHub - theexploiters/CVE-2024-27115-Exploit: Exploit For SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution…
Exploit For SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) - theexploiters/CVE-2024-27115-Exploit