Giter Club home page Giter Club logo

123123123's Projects

cve-2018-7600 icon cve-2018-7600

Exploit for CVE-2018-7600 Drupal SA-CORE-2018-002. PoC (Proof-of-Concept).

cve-2019-1003000-jenkins-rce-poc icon cve-2019-1003000-jenkins-rce-poc

Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)

cve-2019-19781 icon cve-2019-19781

This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.

cvssv3_excel icon cvssv3_excel

Just a small demo of CVSS V3.0 Scoring in an excel spreadsheet

dns-shell icon dns-shell

DNS-Shell is an interactive Shell over DNS channel

dnschef icon dnschef

DNSChef - DNS proxy for Penetration Testers and Malware Analysts

dnslog icon dnslog

DNSLog 是一款监控 DNS 解析记录和 HTTP 访问记录的工具。

dohc2 icon dohc2

DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2) via DNS over HTTPS (DoH).

domainfuzz icon domainfuzz

Domain name permutation engine for detecting typo squatting, phishing and corporate espionage

empire icon empire

Empire is a PowerShell and Python post-exploitation agent.

exp icon exp

收集各种各样的exp

externalc2 icon externalc2

A library for integrating communication channels with the Cobalt Strike External C2 server

frp icon frp

A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.

fuzzdb icon fuzzdb

Web Fuzzing Discovery and Attack Pattern Database

gitgraber icon gitgraber

gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...

hosts icon hosts

镜像:https://coding.net/u/scaffrey/p/hosts/git

iis_exploit icon iis_exploit

Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.

img2ascii icon img2ascii

image convert to ascii 图片转为ascii 字符

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.