GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400-RCE
URL:https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution
URL:https://github.com/ProcessusT/SharpVenoma
标签:#Cobalt Strike
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for CVE-2024-24576 vulnerability \"BatBadBut\"
URL:https://github.com/SheL3G/CVE-2024-24576-PoC-BatBadBut-
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:蓝队
描述:ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
URL:https://github.com/ffffffff0x/1earn
标签:#蓝队
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Exploit for CVE-2024-3400
URL:https://github.com/stronglier/CVE-2024-3400
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:Contextual Deserialization vulnerability that causes RCE - Remote Code Execution
URL:https://github.com/conikeec/jackspoilt
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Extract useful information from PANOS support file for CVE-2024-3400
URL:https://github.com/HackingLZ/panrapidcheck
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:webshell
描述:WebShell for Red Teams, just easily
URL:https://github.com/pushkkk/pushkkk.github.io
标签:#webshell
GitHub监控消息提醒!!!
更新了:攻防
描述:攻防演练过程中,我们通常会用浏览器访问一些资产,但很多未授权/敏感信息/越权隐匿在已访问接口过html、JS文件等,该插件能让我们发现未授权/敏感信息/越权/登陆接口等。
URL:https://github.com/shuanx/BurpAPIFinder
标签:#攻防
GitHub监控消息提醒!!!
更新了:漏洞POC
描述:福建信息职业技术学院CTF平台漏洞扫描与安全审计PoC
URL:https://github.com/Azizi030/FxloudongCTF-Poc
标签:#漏洞POC
GitHub监控消息提醒!!!
更新了:RCE
描述:RCE | 0Click | iOS Version 17+ Supported Control Over Device Remote Support
URL:https://github.com/skullbotnet/iMessageExploit
标签:#RCE
GitHub监控消息提醒!!!
更新了:渗透测试
描述:[✅Py 3.x]渗透测试插件化并发框架 / Open-sourced remote vulnerability PoC/EXP framework,现已兼容 Python3
URL:https://github.com/hi-unc1e/POC-T
标签:#渗透测试
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:EDL for IPs attacking customers with CVE-2024-3400
URL:https://github.com/hahasagined/CVE-2024-3400
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:XZ Utils CVE-2024-3094 POC for Kubernetes
URL:https://github.com/neuralinhibitor/xzwhy
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:免杀
描述:rust 免杀方法记录
URL:https://github.com/xiao-zhu-zhu/RustBypassMap
标签:#免杀
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:PoC for CVE-2024-24576 vulnerability \"BatBadBut\"
URL:https://github.com/SheL3G/CVE-2024-24576-PoC-BatBadBut
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Python exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creation
URL:https://github.com/Kr0ff/cve-2024-3400
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:反序列化
描述:图形化Java反序列化利用工具,集成Ysoserial
URL:https://github.com/0ofo/Deswing
标签:#反序列化
GitHub监控消息提醒!!!
更新了:信息收集
描述:信息收集工具:瞎爬网站下的url并获取响应码与标题的程序
URL:https://github.com/sesmof/url-fucker
标签:#信息收集
GitHub监控消息提醒!!!
更新了:RCE
描述:WORDPRESS-CVE-2024-25600-EXPLOIT-RCE - WordPress Bricks Builder Remote Code Execution (RCE)
URL:https://github.com/X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:绕过
描述:IP-guard WebServer存在权限绕过漏洞(QVD-2024-14103) 检测程序
URL:https://github.com/index2014/IP-Guard-getdatarecord-checker
标签:#绕过
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Simple Python code to check for arbitrary uploading for PaloAlto CVE-2024-3400
URL:https://github.com/codeblueprint/CVE-2024-3400
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Finding Palo Alto devices vulnerable to CVE-2024-3400.
URL:https://github.com/pwnj0hn/CVE-2024-3400
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:反序列化
描述:实现序列和反序列化
URL:https://github.com/wycgi520/my_protocolstream
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:CVE-2024-3400 POC written in Rust and Python
URL:https://github.com/Ravaan21/CVE-2024-3400
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:CVE-2024
描述:Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts
URL:https://github.com/swaybs/CVE-2024-3400
标签:#CVE-2024
GitHub监控消息提醒!!!
更新了:RCE
描述:Python3 RCE PoC for CVE-2021-26084
URL:https://github.com/Marshall-Hallenbeck/CVE-2021-26084_Confluence_RCE
标签:#RCE
GitHub监控消息提醒!!!
更新了:钓鱼
描述:佛跳墙VPN是钓鱼软件吗
URL:https://github.com/cartergibson7efe/what-about-futiaoqiang-vpn
标签:#钓鱼
GitHub监控消息提醒!!!
更新了:RCE
描述:Used to test if git-enabled applications are vulnerable to hook-based RCE. Won't do anything evil, but don't clone this repo
URL:https://github.com/eldstal/shooketh
标签:#RCE