Giter Club home page Giter Club logo

daily-info's Introduction

互联网安全 推荐

ts title url

玄武实验室 推荐

ts title url
20220218 绕过安装包更新机制,提取 Lexmark MC3224i 打印机的固件 http://research.nccgroup.com/2022/02/17/bypassing-software-update-package-encryption-extracting-the-lexmark-mc3224i-printer-firmware-part-1/
20220218 Rust 语言的 Buffer Overflow 漏洞代码实例 https://gist.github.com/rexim/38c176fe4669ef83db69aca9909d7b7f
20220218 利用 Unredacter 工具还原被马赛克打码的文字 https://bishopfox.com/blog/unredacter-tool-never-pixelation
20220218 Android Binder CVE-2019-2215 漏洞的利用 https://cutesmilee.github.io/kernel/linux/android/2022/02/17/cve-2019-2215_writeup.html
20220218 Zabbix - A Case Study of Unsafe Session Storage https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage/
20220218 利用 Kubesploit & KubiScan 开源工具扫描 Kubernetes 的漏洞 https://www.conjur.org/blog/tutorial-kubernetes-vulnerability-scanning-testing-with-open-source/
20220218 Jenkins 默认的 Build Authorization 配置存在缺陷 https://medium.com/cider-sec/exploiting-jenkins-build-authorization-22bf72926072
20220218 Windows 内核保护机制 HyperGuard 的实现研究 https://windows-internals.com/hyperguard-secure-kernel-patch-guard-part-2-skpg-extents/?utm_source=rss&utm_medium=rss&utm_campaign=hyperguard-secure-kernel-patch-guard-part-2-skpg-extents

安全维基 推荐

ts title url
20220218 利用IP分片污染攻击TCP流量 https://mp.weixin.qq.com/s/7gA74jWC1RES76p1XBO_Kw
20220218 “红蓝对抗演练评分系统”开源框架 (preview) https://mp.weixin.qq.com/s/tQMVEsSY9JJXHJI-1gX7cQ
20220218 Web框架CSRF防御的有效性 https://mp.weixin.qq.com/s/ydwWuMa_ZzvvSNZ9CAAxjA
20220218 PRIVGUARD:用于GDPR隐私合规的数据治理框架 https://mp.weixin.qq.com/s/GKwBuIb1UV9phF3HJpDAQw
20220218 中间商之 Ntlm Relay 攻击分析 https://mp.weixin.qq.com/s/EhJVdRG71JTr9yZFajGKqg
20220218 网络安全工作你必须懂的3保1评 https://mp.weixin.qq.com/s/qGcii5iElYq9mwfSFPhfHg
20220218 电子信息工程科技发展十三大挑战(2022) http://www.xinhuanet.com/techpro/20220217/0edc34cae344483a98d7dab8b7367a50/c.html

CVE Github 推荐

ts cve_id title url cve_detail
20220218T13:29:34Z cve-2022-23131 cve-2022-23131 zabbix-saml-bypass-exp https://github.com/Mr-xn/cve-2022-23131
20220218T11:56:43Z CVE-2021-1965 Null https://github.com/parsdefense/CVE-2021-1965
20220218T10:09:47Z CVE-2021-4034 pkexec EoP exploit https://github.com/LJP-TW/CVE-2021-4034
20220218T09:32:09Z CVE-2022-0185 CVE-2021-4034 POC and Docker and simple Analysis write up https://github.com/chenaotian/CVE-2022-0185
20220218T09:29:16Z CVE-2021-4034 A simple PWNKIT file to convert you to root https://github.com/x04000/CVE-2021-4034
20220218T08:40:00Z CVE-2021-44228 Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228 https://github.com/logpresso/CVE-2021-44228-Scanner
20220218T08:04:49Z CVE-2020-15778 Exploit for CVE-2020-15778(OpenSSH vul) https://github.com/Neko-chanQwQ/CVE-2020-15778-Exploit
20220218T03:54:37Z CVE-2021-26855 CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to send arbitrary HTTP requests and authenticate as the Exchange server. https://github.com/raheel0x01/CVE-2021-26855
20220218T03:03:26Z CVE-2022-23131 Null https://github.com/qq1549176285/CVE-2022-23131

klee on Github 推荐

ts title url stars forks
20220218T12:33:56Z 芫荽,基於 Klee One 改造的學習用台灣繁體字型 https://github.com/ButTaiwan/iansui 420 25
20220218T12:17:52Z An open-source Chinese font derived from Fontworks% Klee One. 一款基于 FONTWORKS 出品字体 Klee One 改造的开源中文字体。 https://github.com/lxgw/LxgwWenKai 5195 186

s2e on Github 推荐

ts title url stars forks

exploit on Github 推荐

ts title url stars forks
20220218T13:46:04Z Gather and update all available and newest CVEs with their PoC. https://github.com/trickest/cve 1874 201
20220218T12:50:34Z 聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID. https://github.com/ycdxsb/PocOrExp_in_Github 319 98
20220218T12:50:22Z Monitoring exploits & references for CVEs https://github.com/ARPSyndicate/cvemon 77 14
20220218T12:40:28Z This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more. https://github.com/The-Art-of-Hacking/h4cker 10783 1867
20220218T11:46:54Z Exploit para exploração de plugins Wordpress para auxílio numa possível escalação de privilégios. https://github.com/Nosferatuvjr/RCE-GNU-gdbserver 0 0
20220218T09:33:19Z Null https://github.com/xxycfhb/pku_exploit_files 7 1
20220218T09:19:13Z The whole collection of Exploits developed by me (Hacker5preme) https://github.com/Hacker5preme/Exploits 18 4
20220218T07:11:07Z Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT https://github.com/xsscx/Commodity-Injection-Signatures 306 109
20220218T02:58:28Z https://exploit-poc.com https://github.com/hktalent/exploit-poc 2 1
20220218T02:33:52Z Null https://github.com/LeQuocKhanh2K/Tool_Camera_Exploit_Netwave_CVE-2018-6479 0 0

backdoor on Github 推荐

ts title url stars forks
20220218T13:54:29Z Files related to PoC,,GTFO 21:21 - NSA’s Backdoor of the PX1000-Cr https://github.com/stef/px1000cr 4 0
20220218T13:16:07Z A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side https://github.com/karma9874/AndroRAT 586 227

symbolic execution on Github 推荐

ts title url stars forks
20220218T13:44:33Z Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM. https://github.com/JonathanSalwan/VMProtect-devirtualization 331 56
20220218T05:59:14Z Symbolic execution tool https://github.com/trailofbits/manticore 2714 396

big4 on Github 推荐

ts title url stars forks

fuzz on Github 推荐

ts title url stars forks
20220218T12:30:10Z Null https://github.com/shubhaguha/fuzzy-octo-telegram 0 0
20220218T12:29:07Z JetBrains Research intership project. https://github.com/AnzhelaSukhanova/fuzzing_of_spacer 2 1
20220218T11:50:31Z Null https://github.com/python-divya/fuzzy-octo-giggle 0 0
20220218T11:38:27Z syzkaller is an unsupervised coverage-guided kernel fuzzer https://github.com/google/syzkaller 3966 934
20220218T11:19:28Z Null https://github.com/Tanisk1999/fuzzy 0 0
20220218T10:47:31Z fuzzing https://github.com/standaside/stas 0 0
20220218T10:43:16Z tmp rep https://github.com/Seongyun-Jeong/fuzzbench_analysis 0 0
20220218T10:23:41Z Django application demonstrating grabbing and storing user%s location https://github.com/jaysridhar/fuzzy-spoon 0 0
20220218T08:09:33Z Null https://github.com/love481/fuzzy_based_pid_controller 0 0
20220218T02:40:26Z Null https://github.com/sdjkfsg/fuzzy-octo-disco 0 0

日更新程序

daily-info's People

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.